General

  • Target

    298cdc7896a865fb7748b16d63d83a6994a533699ff0828f3e80d1cd2d9150b8.bin

  • Size

    2.5MB

  • Sample

    241103-1ysdwawarc

  • MD5

    4873e4ac2eb6aa430cccf0ce617072a1

  • SHA1

    4bd62c2c99d9c62745124fed1ae2c6d9d76394e7

  • SHA256

    298cdc7896a865fb7748b16d63d83a6994a533699ff0828f3e80d1cd2d9150b8

  • SHA512

    429f7bc3051a7d103b7c0a6c996519c8c912439ff185233c0409f8031fe5e3862065b953a41eb8a1806372b38b3f508451344b70a281a86f1f5cb2ad61d283d0

  • SSDEEP

    49152:mJ6sq7avYKo3K6TgrPitfyblFg4ggnnfrmipQWk0d/R:d+vYKo3K6aitaYGnfrmykE

Malware Config

Extracted

Family

spynote

C2

192.168.0.101:1212

Targets

    • Target

      298cdc7896a865fb7748b16d63d83a6994a533699ff0828f3e80d1cd2d9150b8.bin

    • Size

      2.5MB

    • MD5

      4873e4ac2eb6aa430cccf0ce617072a1

    • SHA1

      4bd62c2c99d9c62745124fed1ae2c6d9d76394e7

    • SHA256

      298cdc7896a865fb7748b16d63d83a6994a533699ff0828f3e80d1cd2d9150b8

    • SHA512

      429f7bc3051a7d103b7c0a6c996519c8c912439ff185233c0409f8031fe5e3862065b953a41eb8a1806372b38b3f508451344b70a281a86f1f5cb2ad61d283d0

    • SSDEEP

      49152:mJ6sq7avYKo3K6TgrPitfyblFg4ggnnfrmipQWk0d/R:d+vYKo3K6aitaYGnfrmykE

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks