General

  • Target

    ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687.zip

  • Size

    680KB

  • Sample

    241106-dxfmcswncp

  • MD5

    ca55f28d7f288ffc4e3805ac91ab2a30

  • SHA1

    dab80264250e4046a21709c09c3038302dbdb593

  • SHA256

    ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687

  • SHA512

    6418ce1b48d70f587b14ade3882b2150bf9b5b5c83f352620e0a879f7375d50b23ac0ecbf8c514e99ae17cc029259f6c67e1dca373490740bdb9d047deecf7b1

  • SSDEEP

    12288:lwlbo9GgLRBWItYYyow7HCgI4xoQBjj1dFvFIt1+QvZI46Rq21tg+75vV:lwlfglBWItYYjwjCgI4C+jpStUD4GNOm

Malware Config

Extracted

Family

spynote

C2

45.202.33.24:8888

Targets

    • Target

      ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687.zip

    • Size

      680KB

    • MD5

      ca55f28d7f288ffc4e3805ac91ab2a30

    • SHA1

      dab80264250e4046a21709c09c3038302dbdb593

    • SHA256

      ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687

    • SHA512

      6418ce1b48d70f587b14ade3882b2150bf9b5b5c83f352620e0a879f7375d50b23ac0ecbf8c514e99ae17cc029259f6c67e1dca373490740bdb9d047deecf7b1

    • SSDEEP

      12288:lwlbo9GgLRBWItYYyow7HCgI4xoQBjj1dFvFIt1+QvZI46Rq21tg+75vV:lwlfglBWItYYjwjCgI4C+jpStUD4GNOm

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks