General

  • Target

    c78901020e5cc35239904fba638594319d601a521cb3861959650becd27b587b

  • Size

    696KB

  • Sample

    241014-ywfk7atfmd

  • MD5

    6eb1198d80702f3566cd99bf9e4ed1a2

  • SHA1

    5232ea1996c3ca536e195a4cd0d90f7d1621ef01

  • SHA256

    c78901020e5cc35239904fba638594319d601a521cb3861959650becd27b587b

  • SHA512

    73958bfb8f13ad6a23d881ff699bfea90db79908350f9603d7e6cdeafb6ead399dccb11f7f103920c505246d3e994a4b16268bffb787c16b3883de265c3b1a04

  • SSDEEP

    12288:H2wXPfCSkkLbLZSkBZm6UxVXGusT3cgtN0Fzml6Rq21Wg/QtWDsXd:H9P69WbLgkBZHHT3SFzmlGNDzst

Malware Config

Extracted

Family

spynote

C2

3sent.duckdns.org:1604

Targets

    • Target

      c78901020e5cc35239904fba638594319d601a521cb3861959650becd27b587b

    • Size

      696KB

    • MD5

      6eb1198d80702f3566cd99bf9e4ed1a2

    • SHA1

      5232ea1996c3ca536e195a4cd0d90f7d1621ef01

    • SHA256

      c78901020e5cc35239904fba638594319d601a521cb3861959650becd27b587b

    • SHA512

      73958bfb8f13ad6a23d881ff699bfea90db79908350f9603d7e6cdeafb6ead399dccb11f7f103920c505246d3e994a4b16268bffb787c16b3883de265c3b1a04

    • SSDEEP

      12288:H2wXPfCSkkLbLZSkBZm6UxVXGusT3cgtN0Fzml6Rq21Wg/QtWDsXd:H9P69WbLgkBZHHT3SFzmlGNDzst

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks