General

  • Target

    4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401.zip

  • Size

    14.6MB

  • Sample

    241106-c1k6kswjfp

  • MD5

    60bd80eadf48d77303ca3aa4e859c4df

  • SHA1

    0665819584132bed2f42bf7ba332166b795fd493

  • SHA256

    4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401

  • SHA512

    84df47f26be1c776537d6dc04a485d7ce45ecb0a05bb6a9a0904a2c1495603f16c1c5e80ab9627b379aa94d6b194bb34aac9f0934cd6986a48e6a307ec527634

  • SSDEEP

    393216:nVgo++UEBhPQT75d5Zb8RuI1rhMlIPDNQPa0hAcdylFPqC/Dwx4:tdUZ5dTKuMMlILMrjyHPE4

Malware Config

Extracted

Family

spynote

C2

147.185.221.17:5764

Targets

    • Target

      4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401.zip

    • Size

      14.6MB

    • MD5

      60bd80eadf48d77303ca3aa4e859c4df

    • SHA1

      0665819584132bed2f42bf7ba332166b795fd493

    • SHA256

      4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401

    • SHA512

      84df47f26be1c776537d6dc04a485d7ce45ecb0a05bb6a9a0904a2c1495603f16c1c5e80ab9627b379aa94d6b194bb34aac9f0934cd6986a48e6a307ec527634

    • SSDEEP

      393216:nVgo++UEBhPQT75d5Zb8RuI1rhMlIPDNQPa0hAcdylFPqC/Dwx4:tdUZ5dTKuMMlILMrjyHPE4

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks