General

  • Target

    d3d625816c4d76fa83123b9faa467cc59b5c684bb6b506cdc69aac1cbe3d84c5.bin

  • Size

    750KB

  • Sample

    241107-11yzfazalq

  • MD5

    cff204b71e09400f52da561195d3957c

  • SHA1

    4ff1baab1eed2d0a196d551f9e6ce1668482f4ea

  • SHA256

    d3d625816c4d76fa83123b9faa467cc59b5c684bb6b506cdc69aac1cbe3d84c5

  • SHA512

    c5351adfbe403aeb6b408b387cd5149debbbb8e53833a87d7e54631ead34ececd8a55a80d78cacbde874a28ae5029b55f4f24b94a76262e731d61346e85da0b2

  • SSDEEP

    12288:T5VhyPTdJ6sgRALzw3cL/14v5WmpYshXZPbGwidNpggV:T/UbdJ6sjLz0y/14v5WmD9idNpv

Malware Config

Extracted

Family

spynote

C2

nljt5te.localto.net:4866

Targets

    • Target

      d3d625816c4d76fa83123b9faa467cc59b5c684bb6b506cdc69aac1cbe3d84c5.bin

    • Size

      750KB

    • MD5

      cff204b71e09400f52da561195d3957c

    • SHA1

      4ff1baab1eed2d0a196d551f9e6ce1668482f4ea

    • SHA256

      d3d625816c4d76fa83123b9faa467cc59b5c684bb6b506cdc69aac1cbe3d84c5

    • SHA512

      c5351adfbe403aeb6b408b387cd5149debbbb8e53833a87d7e54631ead34ececd8a55a80d78cacbde874a28ae5029b55f4f24b94a76262e731d61346e85da0b2

    • SSDEEP

      12288:T5VhyPTdJ6sgRALzw3cL/14v5WmpYshXZPbGwidNpggV:T/UbdJ6sjLz0y/14v5WmD9idNpv

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks