General

  • Target

    15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc.bin

  • Size

    760KB

  • Sample

    241006-124lbaydmr

  • MD5

    230986f6152a3b0a898bca6869847d98

  • SHA1

    0922174d3244baf0181e905e1c22216f86415ec0

  • SHA256

    15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc

  • SHA512

    3228f3ca94e2addb1242c616ce3d7c6276df184744a446be32051f26b98c234b80c899b3bd32d05d1055934135bdfb84a24e96e11f89d22e1eb41c9e8c385368

  • SSDEEP

    12288:tPV6sa1a8Ldej9X0x27AKY5WmpYshXZPbGwidNpgt:tPfa1a6ejix8AKY5WmD9idNpK

Malware Config

Extracted

Family

spynote

C2

advertising-evil.gl.at.ply.gg:7463

Targets

    • Target

      15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc.bin

    • Size

      760KB

    • MD5

      230986f6152a3b0a898bca6869847d98

    • SHA1

      0922174d3244baf0181e905e1c22216f86415ec0

    • SHA256

      15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc

    • SHA512

      3228f3ca94e2addb1242c616ce3d7c6276df184744a446be32051f26b98c234b80c899b3bd32d05d1055934135bdfb84a24e96e11f89d22e1eb41c9e8c385368

    • SSDEEP

      12288:tPV6sa1a8Ldej9X0x27AKY5WmpYshXZPbGwidNpgt:tPfa1a6ejix8AKY5WmD9idNpK

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks