General

  • Target

    db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3.bin

  • Size

    3.3MB

  • Sample

    241103-1ym46aykcn

  • MD5

    f6d0dbbbc050d7d84a7627c8fc16586e

  • SHA1

    3c5a792b5724aa1260b466b40e8f7a6f36606754

  • SHA256

    db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3

  • SHA512

    41eff631737fd7bfe5bc131bb48d62f13cb75610117aa965194dfa849086b4258577a1b5fe33952639e66170544989bfc50fd177b7bb96cc4211e9fdffacef96

  • SSDEEP

    49152:Ea1aSJ6sq7avYKo3K6TgrPitfyblFg4ggnnfrmipQWk0d/fKrWk0d/N:m+vYKo3K6aitaYGnfrmykTdo

Malware Config

Extracted

Family

spynote

C2

212.15.49.32:9595

Targets

    • Target

      db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3.bin

    • Size

      3.3MB

    • MD5

      f6d0dbbbc050d7d84a7627c8fc16586e

    • SHA1

      3c5a792b5724aa1260b466b40e8f7a6f36606754

    • SHA256

      db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3

    • SHA512

      41eff631737fd7bfe5bc131bb48d62f13cb75610117aa965194dfa849086b4258577a1b5fe33952639e66170544989bfc50fd177b7bb96cc4211e9fdffacef96

    • SSDEEP

      49152:Ea1aSJ6sq7avYKo3K6TgrPitfyblFg4ggnnfrmipQWk0d/fKrWk0d/N:m+vYKo3K6aitaYGnfrmykTdo

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks