General

  • Target

    4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff.bin

  • Size

    760KB

  • Sample

    241108-1xpxcsznay

  • MD5

    3ed9ade08e0b5c31aec010fe264d7c73

  • SHA1

    0a073df5e06a907a8756211278fef880c354763e

  • SHA256

    4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff

  • SHA512

    a6b320a129904813de1bc0be5964124a7dc268febd5bbdbc9460510681628b6042f8b6dc02f46cef1be9e5dc86795f70bc71b0d60ead868712f0dcc42ffea846

  • SSDEEP

    12288:z+QfWqa1a8LrewbK5STXb5WmpYshXZPbGwidNpgA:z+Ua1a2ew+STXb5WmD9idNpz

Malware Config

Extracted

Family

spynote

C2

7.tcp.eu.ngrok.io:17357

Targets

    • Target

      4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff.bin

    • Size

      760KB

    • MD5

      3ed9ade08e0b5c31aec010fe264d7c73

    • SHA1

      0a073df5e06a907a8756211278fef880c354763e

    • SHA256

      4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff

    • SHA512

      a6b320a129904813de1bc0be5964124a7dc268febd5bbdbc9460510681628b6042f8b6dc02f46cef1be9e5dc86795f70bc71b0d60ead868712f0dcc42ffea846

    • SSDEEP

      12288:z+QfWqa1a8LrewbK5STXb5WmpYshXZPbGwidNpgA:z+Ua1a2ew+STXb5WmD9idNpz

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Legitimate hosting services abused for malware hosting/C2

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks