General

  • Target

    9d8b516b5def60e2c8003e54f6d50ef427ece54fd0628b5f9cf02135974b69be.bin

  • Size

    760KB

  • Sample

    241006-1z6b5aycml

  • MD5

    8a76e8bacba533b2187f8cc1ce08438b

  • SHA1

    0b6d3f249b21345043f534fc06c1ebc75b603f13

  • SHA256

    9d8b516b5def60e2c8003e54f6d50ef427ece54fd0628b5f9cf02135974b69be

  • SHA512

    799632bc12e653f764c51b536b15afaa558e64d0d9d1993dd6db7d7da2f665caa5a41dcd13bae9d0e88caae06b12e35b08ad8d42ab42fdc13cb0d1ebf425d01c

  • SSDEEP

    12288:orD1a1a8LreBT5BSr7dLF5WmpYshXZPbGwidNpgn:o9a1a2eBzSfdLF5WmD9idNpA

Malware Config

Extracted

Family

spynote

C2

c-bacterial.gl.at.ply.gg:7926

Targets

    • Target

      9d8b516b5def60e2c8003e54f6d50ef427ece54fd0628b5f9cf02135974b69be.bin

    • Size

      760KB

    • MD5

      8a76e8bacba533b2187f8cc1ce08438b

    • SHA1

      0b6d3f249b21345043f534fc06c1ebc75b603f13

    • SHA256

      9d8b516b5def60e2c8003e54f6d50ef427ece54fd0628b5f9cf02135974b69be

    • SHA512

      799632bc12e653f764c51b536b15afaa558e64d0d9d1993dd6db7d7da2f665caa5a41dcd13bae9d0e88caae06b12e35b08ad8d42ab42fdc13cb0d1ebf425d01c

    • SSDEEP

      12288:orD1a1a8LreBT5BSr7dLF5WmpYshXZPbGwidNpgn:o9a1a2eBzSfdLF5WmD9idNpA

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks