General

  • Target

    0388a187720482d485cd58d5dd4b5e89bfa00522e45bc0dae21a95c6cb5a929c.bin

  • Size

    792KB

  • Sample

    241026-1xtwbazbnf

  • MD5

    e5d6b2124dd766ac1385d1ed72b74c2a

  • SHA1

    a78286b71ec0a1852fb814ee3f29fbe410d00052

  • SHA256

    0388a187720482d485cd58d5dd4b5e89bfa00522e45bc0dae21a95c6cb5a929c

  • SHA512

    238ccafb89e5257d6661f4c84927696be13652b41863c69e88c810e65db5a32dc1f5d958c98e70dd2b24c764f03ef7742bd5c80b468567d29bc64a371d771793

  • SSDEEP

    12288:Gva1a8Lze11kH+EUGuVIH+5WmpYshXZPbGwidNpgD4:Gva1ame11kHTUGPH+5WmD9idNpI4

Malware Config

Extracted

Family

spynote

C2

miahra32475-54301.portmap.host:54301

Targets

    • Target

      0388a187720482d485cd58d5dd4b5e89bfa00522e45bc0dae21a95c6cb5a929c.bin

    • Size

      792KB

    • MD5

      e5d6b2124dd766ac1385d1ed72b74c2a

    • SHA1

      a78286b71ec0a1852fb814ee3f29fbe410d00052

    • SHA256

      0388a187720482d485cd58d5dd4b5e89bfa00522e45bc0dae21a95c6cb5a929c

    • SHA512

      238ccafb89e5257d6661f4c84927696be13652b41863c69e88c810e65db5a32dc1f5d958c98e70dd2b24c764f03ef7742bd5c80b468567d29bc64a371d771793

    • SSDEEP

      12288:Gva1a8Lze11kH+EUGuVIH+5WmpYshXZPbGwidNpgD4:Gva1ame11kHTUGPH+5WmD9idNpI4

    • Removes its main activity from the application launcher

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks