General

  • Target

    dfbfeed930f2c6923395f4884e43eee48974e72ef49d0f18d3ee8dcb0b2e4ae5.bin

  • Size

    841KB

  • Sample

    241001-1z4hjasgjn

  • MD5

    16316be60634f8c513530c6f4311de9d

  • SHA1

    4d75dc6db2f32b50fb47b8cd49f397ff81330469

  • SHA256

    dfbfeed930f2c6923395f4884e43eee48974e72ef49d0f18d3ee8dcb0b2e4ae5

  • SHA512

    8e5a80425b9fe934c127c2f3aa09a9ee3b9bd3c0a8ce7f0601799db5f313723295d63153630d31ddc68ff3cb64a22dce04016a5738217c87e550756b86c63b62

  • SSDEEP

    12288:wfO/xSa1a8Lreby4NFNuMuBf0IRFql5WmpYshXZPbGwidNpgmT:wmIa1a2eZNiB1RFql5WmD9idNp5T

Malware Config

Extracted

Family

spynote

C2

hot-apartments.at.ply.gg:22817

Targets

    • Target

      dfbfeed930f2c6923395f4884e43eee48974e72ef49d0f18d3ee8dcb0b2e4ae5.bin

    • Size

      841KB

    • MD5

      16316be60634f8c513530c6f4311de9d

    • SHA1

      4d75dc6db2f32b50fb47b8cd49f397ff81330469

    • SHA256

      dfbfeed930f2c6923395f4884e43eee48974e72ef49d0f18d3ee8dcb0b2e4ae5

    • SHA512

      8e5a80425b9fe934c127c2f3aa09a9ee3b9bd3c0a8ce7f0601799db5f313723295d63153630d31ddc68ff3cb64a22dce04016a5738217c87e550756b86c63b62

    • SSDEEP

      12288:wfO/xSa1a8Lreby4NFNuMuBf0IRFql5WmpYshXZPbGwidNpgmT:wmIa1a2eZNiB1RFql5WmD9idNp5T

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks