General

  • Target

    3ef54a021a152aa8c3f745edbc149903d46c7515452f2f4e1e4965c4037894a7.bin

  • Size

    760KB

  • Sample

    241026-1yc9ysxqaz

  • MD5

    449508e3b5c6223da212a81cb1335087

  • SHA1

    febb324de9544e7509f3e2ba02cf2910650f5bcc

  • SHA256

    3ef54a021a152aa8c3f745edbc149903d46c7515452f2f4e1e4965c4037894a7

  • SHA512

    198f5bcc80388e71dafcba3f322c096982781b81863c6373b5949fc2d2255343ad89a2351485943ff79a9d2acac0ce0473683fa93d0bd7b007d4f698074f4e34

  • SSDEEP

    12288:FoVxNa1a8Lre3ZfCVTmY5WmpYshXZPbGwidNpgG:yRa1a2e3IVTmY5WmD9idNpN

Malware Config

Extracted

Family

spynote

C2

spy12.zapto.org:19132

Targets

    • Target

      3ef54a021a152aa8c3f745edbc149903d46c7515452f2f4e1e4965c4037894a7.bin

    • Size

      760KB

    • MD5

      449508e3b5c6223da212a81cb1335087

    • SHA1

      febb324de9544e7509f3e2ba02cf2910650f5bcc

    • SHA256

      3ef54a021a152aa8c3f745edbc149903d46c7515452f2f4e1e4965c4037894a7

    • SHA512

      198f5bcc80388e71dafcba3f322c096982781b81863c6373b5949fc2d2255343ad89a2351485943ff79a9d2acac0ce0473683fa93d0bd7b007d4f698074f4e34

    • SSDEEP

      12288:FoVxNa1a8Lre3ZfCVTmY5WmpYshXZPbGwidNpgG:yRa1a2e3IVTmY5WmD9idNpN

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks