General

  • Target

    f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8.bin

  • Size

    760KB

  • Sample

    240713-1ynqpa1erh

  • MD5

    3f4d8716c61776b795f651bca91c8c65

  • SHA1

    6e456a53bd69a1c01a96f237f6eef041dc0c209a

  • SHA256

    f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8

  • SHA512

    87c3c68124d55aff7beeb4c3532d4ad87886ba7618983f42a8349e2ab80c798b577a1bc0675a34b32792e336fd73c61921b6a849f4cf4f231cb5eea1d475c86a

  • SSDEEP

    12288:n6zxFdJ6sgR8Lzp95eDxwy5WmpYshXZPbGwidNpg/3o:n6zVJ6stLzp6Dxwy5WmD9idNp+o

Malware Config

Extracted

Family

spynote

C2

0.tcp.sa.ngrok.io:19280

Targets

    • Target

      f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8.bin

    • Size

      760KB

    • MD5

      3f4d8716c61776b795f651bca91c8c65

    • SHA1

      6e456a53bd69a1c01a96f237f6eef041dc0c209a

    • SHA256

      f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8

    • SHA512

      87c3c68124d55aff7beeb4c3532d4ad87886ba7618983f42a8349e2ab80c798b577a1bc0675a34b32792e336fd73c61921b6a849f4cf4f231cb5eea1d475c86a

    • SSDEEP

      12288:n6zxFdJ6sgR8Lzp95eDxwy5WmpYshXZPbGwidNpg/3o:n6zVJ6stLzp6Dxwy5WmD9idNp+o

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks