General

  • Target

    33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c.zip

  • Size

    1.9MB

  • Sample

    241106-cwdkyaslgw

  • MD5

    9136721b5fa07efb8f326eca03e7534e

  • SHA1

    0c93e6264aa644347f4d1166a97139268b88c875

  • SHA256

    33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c

  • SHA512

    fae73b9431df9ba4d73b7a2e585e9c393e00e2d09f7faea42f0eda63397fa9ee9742cae78e5b075a576fc883fefd3c1718d7a20979ebea90bb9e697a2230430d

  • SSDEEP

    12288:5GHQyuFIRTgMWb0hLeZ3ob5OuM5WrFFMK1YnU/:j3IRTgMWELeCb5OujMK1uU/

Malware Config

Extracted

Family

spynote

C2

192.168.1.36:8080

Extracted

Family

spynote

C2

192.168.1.36:8080

Targets

    • Target

      33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c.zip

    • Size

      1.9MB

    • MD5

      9136721b5fa07efb8f326eca03e7534e

    • SHA1

      0c93e6264aa644347f4d1166a97139268b88c875

    • SHA256

      33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c

    • SHA512

      fae73b9431df9ba4d73b7a2e585e9c393e00e2d09f7faea42f0eda63397fa9ee9742cae78e5b075a576fc883fefd3c1718d7a20979ebea90bb9e697a2230430d

    • SSDEEP

      12288:5GHQyuFIRTgMWb0hLeZ3ob5OuM5WrFFMK1YnU/:j3IRTgMWELeCb5OujMK1uU/

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks