General

  • Target

    19fb1e694474e0bf7cbb3b630c8d96abc02a4ddc697c94553d803918b4a4f620.zip

  • Size

    14.6MB

  • Sample

    241106-cl4dlsshkb

  • MD5

    8c2e16063d5eb72a12e0bf0ee12fabef

  • SHA1

    45113fa233fe7423c55faf15e2d96d2e4a875aae

  • SHA256

    19fb1e694474e0bf7cbb3b630c8d96abc02a4ddc697c94553d803918b4a4f620

  • SHA512

    3f0d820989c62809757e15fe420f53f0e861e5a32b56fd9d11b852d435cf7ca2d55a4af39476479fa6156079d17815fa2fc289d0e0aefc16c9299a33bf0f815f

  • SSDEEP

    393216:nLOo++UEBhPQT75d5Zb8RuI1rhMlIPDNQPa0hAcdylFPqC/Dwx0:5dUZ5dTKuMMlILMrjyHPE0

Malware Config

Extracted

Family

spynote

C2

147.185.221.17:5764

Targets

    • Target

      19fb1e694474e0bf7cbb3b630c8d96abc02a4ddc697c94553d803918b4a4f620.zip

    • Size

      14.6MB

    • MD5

      8c2e16063d5eb72a12e0bf0ee12fabef

    • SHA1

      45113fa233fe7423c55faf15e2d96d2e4a875aae

    • SHA256

      19fb1e694474e0bf7cbb3b630c8d96abc02a4ddc697c94553d803918b4a4f620

    • SHA512

      3f0d820989c62809757e15fe420f53f0e861e5a32b56fd9d11b852d435cf7ca2d55a4af39476479fa6156079d17815fa2fc289d0e0aefc16c9299a33bf0f815f

    • SSDEEP

      393216:nLOo++UEBhPQT75d5Zb8RuI1rhMlIPDNQPa0hAcdylFPqC/Dwx0:5dUZ5dTKuMMlILMrjyHPE0

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks