General

  • Target

    9ebb60ada8b19e06a92fc8c868959626deee355aef796c16f9e233f6d52c0306

  • Size

    12.5MB

  • Sample

    241111-njd7gsslaj

  • MD5

    12b92b000d9431c19864408c916e558b

  • SHA1

    79349cadfd9309806c398fba2dd6d5825f772a8a

  • SHA256

    9ebb60ada8b19e06a92fc8c868959626deee355aef796c16f9e233f6d52c0306

  • SHA512

    d11473dba6edba3a99cf732f90fc2b546321e4d137e023f065e74932b2d8d040593ea8c8f3fc2da9a8bf6d3b137bc2fdba83f0ac427795caf510de8372116bac

  • SSDEEP

    196608:Ia96xtqAw4Eo42eaAew7uySoImf7AMAr7+2LTaD2cUMYNkIuJtUZr2pvgXckYU:I1tVwD2tPoImEM92LTaKo7wipoMDU

Malware Config

Extracted

Family

spynote

C2

103.74.105.194:7006

Targets

    • Target

      9ebb60ada8b19e06a92fc8c868959626deee355aef796c16f9e233f6d52c0306

    • Size

      12.5MB

    • MD5

      12b92b000d9431c19864408c916e558b

    • SHA1

      79349cadfd9309806c398fba2dd6d5825f772a8a

    • SHA256

      9ebb60ada8b19e06a92fc8c868959626deee355aef796c16f9e233f6d52c0306

    • SHA512

      d11473dba6edba3a99cf732f90fc2b546321e4d137e023f065e74932b2d8d040593ea8c8f3fc2da9a8bf6d3b137bc2fdba83f0ac427795caf510de8372116bac

    • SSDEEP

      196608:Ia96xtqAw4Eo42eaAew7uySoImf7AMAr7+2LTaD2cUMYNkIuJtUZr2pvgXckYU:I1tVwD2tPoImEM92LTaKo7wipoMDU

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks