General

  • Target

    0365cc3dcb3c29a207b33d6df54a45aa76466b1e54b9438673259091a434bf28.bin

  • Size

    3.6MB

  • Sample

    241019-16qv1sthln

  • MD5

    14c317d43c858148020c840c453f237c

  • SHA1

    94ee1cb36c453a63739c7182153dd68573c2c505

  • SHA256

    0365cc3dcb3c29a207b33d6df54a45aa76466b1e54b9438673259091a434bf28

  • SHA512

    287e48aecc8e4f1a914a4d08d59c8316e18bf2e3b1b643f0ed5a50a2323f1735b7bfc5c9afab326bcbb58d3bf874d81dbe34fe8a94c3e91b4c7f676a9496dc28

  • SSDEEP

    98304:9vwbHboDX3mcA50PCGccqBR5ac0azkHsIYEf5bFk5V8thH1Q:VHPdFazKnthHm

Malware Config

Extracted

Family

spynote

C2

romeo55555.ddns.net:1199

Targets

    • Target

      0365cc3dcb3c29a207b33d6df54a45aa76466b1e54b9438673259091a434bf28.bin

    • Size

      3.6MB

    • MD5

      14c317d43c858148020c840c453f237c

    • SHA1

      94ee1cb36c453a63739c7182153dd68573c2c505

    • SHA256

      0365cc3dcb3c29a207b33d6df54a45aa76466b1e54b9438673259091a434bf28

    • SHA512

      287e48aecc8e4f1a914a4d08d59c8316e18bf2e3b1b643f0ed5a50a2323f1735b7bfc5c9afab326bcbb58d3bf874d81dbe34fe8a94c3e91b4c7f676a9496dc28

    • SSDEEP

      98304:9vwbHboDX3mcA50PCGccqBR5ac0azkHsIYEf5bFk5V8thH1Q:VHPdFazKnthHm

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks