General

  • Target

    f0c07860af1fa4b500f1522a78d1915e1131cff61d43c35b4a0d81f8ab77b5fe.zip

  • Size

    14.6MB

  • Sample

    241106-ehw68sthmh

  • MD5

    31e2ad8a0e720ebfbf8ea0614ec2f847

  • SHA1

    620caf2fcf7f6605be2890ca7acf03f19d341bb9

  • SHA256

    f0c07860af1fa4b500f1522a78d1915e1131cff61d43c35b4a0d81f8ab77b5fe

  • SHA512

    e998c558f3ee428f6a195f5b3fffb30d1107521c13c8dc9c852d1a7719d4248cdcaf5901e705af62298e317694c111edbf1e953b58406a7b33eb934871225837

  • SSDEEP

    393216:+USo++UEBhPQT75d5Zb8RuI1rhMlIPDNQPa0hAcdylFPqC/Dwx7:TdUZ5dTKuMMlILMrjyHPE7

Malware Config

Extracted

Family

spynote

C2

147.185.221.17:5764

Targets

    • Target

      f0c07860af1fa4b500f1522a78d1915e1131cff61d43c35b4a0d81f8ab77b5fe.zip

    • Size

      14.6MB

    • MD5

      31e2ad8a0e720ebfbf8ea0614ec2f847

    • SHA1

      620caf2fcf7f6605be2890ca7acf03f19d341bb9

    • SHA256

      f0c07860af1fa4b500f1522a78d1915e1131cff61d43c35b4a0d81f8ab77b5fe

    • SHA512

      e998c558f3ee428f6a195f5b3fffb30d1107521c13c8dc9c852d1a7719d4248cdcaf5901e705af62298e317694c111edbf1e953b58406a7b33eb934871225837

    • SSDEEP

      393216:+USo++UEBhPQT75d5Zb8RuI1rhMlIPDNQPa0hAcdylFPqC/Dwx7:TdUZ5dTKuMMlILMrjyHPE7

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks