General

  • Target

    7a320d936381ddba39d963ceebb9f3024dd8ad60ba92c11931f040acd26b53eb.bin

  • Size

    773KB

  • Sample

    240909-15ljxavdqf

  • MD5

    a4bd10fa4bba0d5f6831ee2aea0ef66c

  • SHA1

    74cce96a8f3e3af0d94424a81bc57662c96ad8f8

  • SHA256

    7a320d936381ddba39d963ceebb9f3024dd8ad60ba92c11931f040acd26b53eb

  • SHA512

    71a82c2b2af168c6b045a15e85e2e9802ffa2718f34811d3d472110d1c8965d60132a631a38e9833c0f7e9e9db7e632e4ce649aede636d4ce6dac7f52e0c6ce8

  • SSDEEP

    12288:yOO5EJ6sgRQLzELng11G5WmpYshXZPbGwidNpgC:7NJ6sjLzEbg11G5WmD9idNpt

Malware Config

Extracted

Family

spynote

C2

redblackspy.ddns.net:4444

Targets

    • Target

      7a320d936381ddba39d963ceebb9f3024dd8ad60ba92c11931f040acd26b53eb.bin

    • Size

      773KB

    • MD5

      a4bd10fa4bba0d5f6831ee2aea0ef66c

    • SHA1

      74cce96a8f3e3af0d94424a81bc57662c96ad8f8

    • SHA256

      7a320d936381ddba39d963ceebb9f3024dd8ad60ba92c11931f040acd26b53eb

    • SHA512

      71a82c2b2af168c6b045a15e85e2e9802ffa2718f34811d3d472110d1c8965d60132a631a38e9833c0f7e9e9db7e632e4ce649aede636d4ce6dac7f52e0c6ce8

    • SSDEEP

      12288:yOO5EJ6sgRQLzELng11G5WmpYshXZPbGwidNpgC:7NJ6sjLzEbg11G5WmD9idNpt

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks