General

  • Target

    5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e.bin

  • Size

    760KB

  • Sample

    240719-1z2c6swcja

  • MD5

    2851d376bcbdbbb92e2bdfe8bc277dab

  • SHA1

    0a0fa4d46566db3125ee6924d6b198bf974fad62

  • SHA256

    5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e

  • SHA512

    8c71cb8ec362d86d9624184db85501ba6af3fcce110b5719895c1258b7ad80e31a7695562eeb7b4fe812fe7bc41c03eeea6c36475b47f4b6c0a0d4073c23c620

  • SSDEEP

    12288:J+JBjkAgMsFMjIPRjL5/RG941IfvNld6dlv:J+jFsFdRjL5J2fvNqd9

Malware Config

Extracted

Family

spynote

C2

192.168.1.20:4444

Targets

    • Target

      5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e.bin

    • Size

      760KB

    • MD5

      2851d376bcbdbbb92e2bdfe8bc277dab

    • SHA1

      0a0fa4d46566db3125ee6924d6b198bf974fad62

    • SHA256

      5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e

    • SHA512

      8c71cb8ec362d86d9624184db85501ba6af3fcce110b5719895c1258b7ad80e31a7695562eeb7b4fe812fe7bc41c03eeea6c36475b47f4b6c0a0d4073c23c620

    • SSDEEP

      12288:J+JBjkAgMsFMjIPRjL5/RG941IfvNld6dlv:J+jFsFdRjL5J2fvNqd9

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks