General

  • Target

    c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c.bin

  • Size

    760KB

  • Sample

    241109-25x4daxjhl

  • MD5

    a394528ab3192dd6c2646a8c02c02c9c

  • SHA1

    ccfcfec2860eeafdcda0b81933d93048aeaa4777

  • SHA256

    c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c

  • SHA512

    39765a42d9d9eb45d39dffc4496542c3e0c4dab045243ea9ccea0a00a0023f812f56f98a3ffb53397949f5242d93c45d5a437b39d35fad9b1e73d706d90a317c

  • SSDEEP

    12288:dWpqlgBZRvSMqHBToBQik5WmpYshXZPbGwidNpgk:dWp5BZRrqHeBQik5WmD9idNpf

Malware Config

Extracted

Family

spynote

C2

23.ip.gl.ply.gg:52111

Targets

    • Target

      c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c.bin

    • Size

      760KB

    • MD5

      a394528ab3192dd6c2646a8c02c02c9c

    • SHA1

      ccfcfec2860eeafdcda0b81933d93048aeaa4777

    • SHA256

      c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c

    • SHA512

      39765a42d9d9eb45d39dffc4496542c3e0c4dab045243ea9ccea0a00a0023f812f56f98a3ffb53397949f5242d93c45d5a437b39d35fad9b1e73d706d90a317c

    • SSDEEP

      12288:dWpqlgBZRvSMqHBToBQik5WmpYshXZPbGwidNpgk:dWp5BZRrqHeBQik5WmD9idNpf

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks