General

  • Target

    b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.bin

  • Size

    760KB

  • Sample

    240613-gd2bhawdnf

  • MD5

    37dd03ddca420a394191620ad235297a

  • SHA1

    3be1b5e54d243429d69ea9680ca8fcaba6a63930

  • SHA256

    b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763

  • SHA512

    c7361d7e93bab36d659d3f1d7806494441e0c2d11658891942424046bf33d3f509700004a50a704b7aac9e51d5c442a2f51c9e541c1bc3538a6288ac426576ad

  • SSDEEP

    12288:KR86KC2ja1a8LdeUtyMkAJB5WmpYshXZPbGwidNpgu:KW6Ea1a6eUZkAJB5WmD9idNpR

Malware Config

Extracted

Family

spynote

C2

0.tcp.ngrok.io:14051

Targets

    • Target

      b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.bin

    • Size

      760KB

    • MD5

      37dd03ddca420a394191620ad235297a

    • SHA1

      3be1b5e54d243429d69ea9680ca8fcaba6a63930

    • SHA256

      b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763

    • SHA512

      c7361d7e93bab36d659d3f1d7806494441e0c2d11658891942424046bf33d3f509700004a50a704b7aac9e51d5c442a2f51c9e541c1bc3538a6288ac426576ad

    • SSDEEP

      12288:KR86KC2ja1a8LdeUtyMkAJB5WmpYshXZPbGwidNpgu:KW6Ea1a6eUZkAJB5WmD9idNpR

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks