General

  • Target

    93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6.bin

  • Size

    1.2MB

  • Sample

    241113-1wslvszfpa

  • MD5

    bb754b8b1592e337d2d56c896ee36649

  • SHA1

    30d499a73d747a43f2e041ff5480561f194f2489

  • SHA256

    93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6

  • SHA512

    a599a63761daf2299c4b1135b16d666a413674b7377880514a42cae7e45ed50258d24bd6da7a14901668706414342a4f5770764f5cb7607c9204c542b7df360a

  • SSDEEP

    24576:zecIa1amefBUMsngXgsnnq8gCsYPeXt4aQ5WmD9idNph:/Ia1aJsngTq8l1Pe9GWk0d/h

Malware Config

Extracted

Family

spynote

C2

192.168.56.1:9595

Targets

    • Target

      93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6.bin

    • Size

      1.2MB

    • MD5

      bb754b8b1592e337d2d56c896ee36649

    • SHA1

      30d499a73d747a43f2e041ff5480561f194f2489

    • SHA256

      93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6

    • SHA512

      a599a63761daf2299c4b1135b16d666a413674b7377880514a42cae7e45ed50258d24bd6da7a14901668706414342a4f5770764f5cb7607c9204c542b7df360a

    • SSDEEP

      24576:zecIa1amefBUMsngXgsnnq8gCsYPeXt4aQ5WmD9idNph:/Ia1aJsngTq8l1Pe9GWk0d/h

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks