General

  • Target

    111aa1adb052d29336802c49a62da99ec3285f1ade8cec1d10ab3c99a8cc9d3e.bin

  • Size

    760KB

  • Sample

    241009-1xx8qszaqf

  • MD5

    bff8ea794b8aff96ca8782723aa2ba51

  • SHA1

    9ee625a2845e1f0a38f3c8fc91159b127eb599be

  • SHA256

    111aa1adb052d29336802c49a62da99ec3285f1ade8cec1d10ab3c99a8cc9d3e

  • SHA512

    a88f2db28a98077df7d3f922a90a09796dd20049be2b3a450186c5705014a85a01da835fd72c59ea3197bf8a8e149ba75513ba322d89e921072366d9fa151464

  • SSDEEP

    12288:uOn3a1a8LzeAVK0gwJ55WmpYshXZPbGwidNpgo:uOa1ameAVgwJ55WmD9idNpX

Malware Config

Extracted

Family

spynote

C2

registration-diane.gl.at.ply.gg:62445

Targets

    • Target

      111aa1adb052d29336802c49a62da99ec3285f1ade8cec1d10ab3c99a8cc9d3e.bin

    • Size

      760KB

    • MD5

      bff8ea794b8aff96ca8782723aa2ba51

    • SHA1

      9ee625a2845e1f0a38f3c8fc91159b127eb599be

    • SHA256

      111aa1adb052d29336802c49a62da99ec3285f1ade8cec1d10ab3c99a8cc9d3e

    • SHA512

      a88f2db28a98077df7d3f922a90a09796dd20049be2b3a450186c5705014a85a01da835fd72c59ea3197bf8a8e149ba75513ba322d89e921072366d9fa151464

    • SSDEEP

      12288:uOn3a1a8LzeAVK0gwJ55WmpYshXZPbGwidNpgo:uOa1ameAVgwJ55WmD9idNpX

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks