General

  • Target

    5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940.bin

  • Size

    760KB

  • Sample

    241109-253zmatke1

  • MD5

    7f21769f9964b8fc5844c3d49135a76f

  • SHA1

    316a6f8a57b1bbac4b9a7c98132e536f5247aea0

  • SHA256

    5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940

  • SHA512

    f26064720de467704829c9014cfb65351e8a6fa444f241bfac54e72d93717deb64f83be7d333364f84d7f3e2800186805c51b5658461da02dfabdebdc5c82650

  • SSDEEP

    12288:jSeIY5da1a8Lre/pPf1EFm5WmpYshXZPbGwidNpg3:jLI8a1a2e/V1EFm5WmD9idNpE

Malware Config

Extracted

Family

spynote

C2

rohinmur123-47569.portmap.io:47569

Targets

    • Target

      5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940.bin

    • Size

      760KB

    • MD5

      7f21769f9964b8fc5844c3d49135a76f

    • SHA1

      316a6f8a57b1bbac4b9a7c98132e536f5247aea0

    • SHA256

      5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940

    • SHA512

      f26064720de467704829c9014cfb65351e8a6fa444f241bfac54e72d93717deb64f83be7d333364f84d7f3e2800186805c51b5658461da02dfabdebdc5c82650

    • SSDEEP

      12288:jSeIY5da1a8Lre/pPf1EFm5WmpYshXZPbGwidNpg3:jLI8a1a2e/V1EFm5WmD9idNpE

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks