General

  • Target

    4551eb982855522b56a8ba58f36ae99a54f61a58837b736f175d90de483e8b8a.bin

  • Size

    2.4MB

  • Sample

    241110-1153razjfq

  • MD5

    91224517a851f2cd5f940c9a0b0e869d

  • SHA1

    6cea761248e0dba7f6019e5e268ca9cb27cf8605

  • SHA256

    4551eb982855522b56a8ba58f36ae99a54f61a58837b736f175d90de483e8b8a

  • SHA512

    e01e71b5334929c28788b5b9bc6d61b57e860410dea0f58ff696f728fc00f3e1948e3a63ded4a944a47d33cd59d09dac68d66d7566f5f8972664ee81fa93afab

  • SSDEEP

    49152:xa1aU7f51DlgVAYApeDPtf1vN5r/qfvR27gagjJJmcuzT1Wk0d/o:U1DlghsKx1vTr/qfvR+U8zd

Malware Config

Extracted

Family

spynote

C2

192.168.11.104:8080

Targets

    • Target

      4551eb982855522b56a8ba58f36ae99a54f61a58837b736f175d90de483e8b8a.bin

    • Size

      2.4MB

    • MD5

      91224517a851f2cd5f940c9a0b0e869d

    • SHA1

      6cea761248e0dba7f6019e5e268ca9cb27cf8605

    • SHA256

      4551eb982855522b56a8ba58f36ae99a54f61a58837b736f175d90de483e8b8a

    • SHA512

      e01e71b5334929c28788b5b9bc6d61b57e860410dea0f58ff696f728fc00f3e1948e3a63ded4a944a47d33cd59d09dac68d66d7566f5f8972664ee81fa93afab

    • SSDEEP

      49152:xa1aU7f51DlgVAYApeDPtf1vN5r/qfvR27gagjJJmcuzT1Wk0d/o:U1DlghsKx1vTr/qfvR+U8zd

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks