General

  • Target

    ca55f28d7f288ffc4e3805ac91ab2a30.bin

  • Size

    627KB

  • Sample

    241107-cadc2stamr

  • MD5

    e9257d5a2c7e3f1069e989c95f8f8ba9

  • SHA1

    32bf7c53f3237da5a36123b8c1106ee77682e76a

  • SHA256

    bd40f762473c220ff30ea556d4cc3cd1fdb272ec5ef5090f2b091ff7a1ad8dd2

  • SHA512

    e6426369a313921ed0273c26f929e5f831d718c537fddc187928bd9c2530ca296b2344099f80ba1fe9f32ff46c01261e3c97e92bd74a91a9612017987a125131

  • SSDEEP

    12288:L6ZbLjbTVftvHRS/Xf8tZzN46sZvINfAihrJ9fwg28KKOmbjjDOE16:mZHj1ftvHd5N49vIlPhbfwg2vKOmb3ar

Malware Config

Extracted

Family

spynote

C2

45.202.33.24:8888

Targets

    • Target

      ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687.zip

    • Size

      680KB

    • MD5

      ca55f28d7f288ffc4e3805ac91ab2a30

    • SHA1

      dab80264250e4046a21709c09c3038302dbdb593

    • SHA256

      ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687

    • SHA512

      6418ce1b48d70f587b14ade3882b2150bf9b5b5c83f352620e0a879f7375d50b23ac0ecbf8c514e99ae17cc029259f6c67e1dca373490740bdb9d047deecf7b1

    • SSDEEP

      12288:lwlbo9GgLRBWItYYyow7HCgI4xoQBjj1dFvFIt1+QvZI46Rq21tg+75vV:lwlfglBWItYYjwjCgI4C+jpStUD4GNOm

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks