General

  • Target

    578a103e3064e135a772471a11bf76c6966cea8ea45746907e8c5b33172bb5c1.bin

  • Size

    907KB

  • Sample

    241024-1y5n7svhkf

  • MD5

    41000b5ebb492adcd4afafd049b078cc

  • SHA1

    e1e938a4337dce01924c6b4107b4290eb071b11a

  • SHA256

    578a103e3064e135a772471a11bf76c6966cea8ea45746907e8c5b33172bb5c1

  • SHA512

    8a8a9c8a8ad3055bd1b66fb96d5a18588cd989d72991564afac58f350fdae8a6c80623de85fdb06e5e6de94834e7a72a83485228f0da753b56c8bad94123b4a3

  • SSDEEP

    12288:l75K6Rq21wzSvNs+vz8eguM9Bj/wE+cgXJcVfmESeeeeeeeeedIDpsPl7656p7BO:mGNwzSvN/b8bZ9BbjgZ4+E+ol7nYyvkD

Malware Config

Extracted

Family

anubis

C2

http://localhost:8080/

Extracted

Family

spynote

C2

154.61.77.100:7771

Targets

    • Target

      578a103e3064e135a772471a11bf76c6966cea8ea45746907e8c5b33172bb5c1.bin

    • Size

      907KB

    • MD5

      41000b5ebb492adcd4afafd049b078cc

    • SHA1

      e1e938a4337dce01924c6b4107b4290eb071b11a

    • SHA256

      578a103e3064e135a772471a11bf76c6966cea8ea45746907e8c5b33172bb5c1

    • SHA512

      8a8a9c8a8ad3055bd1b66fb96d5a18588cd989d72991564afac58f350fdae8a6c80623de85fdb06e5e6de94834e7a72a83485228f0da753b56c8bad94123b4a3

    • SSDEEP

      12288:l75K6Rq21wzSvNs+vz8eguM9Bj/wE+cgXJcVfmESeeeeeeeeedIDpsPl7656p7BO:mGNwzSvN/b8bZ9BbjgZ4+E+ol7nYyvkD

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks