General

  • Target

    f0cf462438fee1d63b901abf7c2537a489c13c5c217f93a64c94040a9ecb2b53.bin

  • Size

    777KB

  • Sample

    241114-1yfebatkav

  • MD5

    8acc2d3e421e001ad6994e57919ebea8

  • SHA1

    67ff912d62177157c2a3fd6130fa722714004471

  • SHA256

    f0cf462438fee1d63b901abf7c2537a489c13c5c217f93a64c94040a9ecb2b53

  • SHA512

    da72d00b302c7fa86489ce807f17fe2c83dba55c2e14819c832ff2ea90623d0b7f2e930f471e1bc7cc18dfae15fe14dd6a9880afd4556fb4b1f300466accedf0

  • SSDEEP

    12288:gO2C0F6a1a8LrerbvLrPsi5WmpYshXZPbGwidNpgw:d2CY6a1a2erjLTsi5WmD9idNpP

Malware Config

Extracted

Family

spynote

C2

go-puppy.gl.at.ply.gg:56337

Targets

    • Target

      f0cf462438fee1d63b901abf7c2537a489c13c5c217f93a64c94040a9ecb2b53.bin

    • Size

      777KB

    • MD5

      8acc2d3e421e001ad6994e57919ebea8

    • SHA1

      67ff912d62177157c2a3fd6130fa722714004471

    • SHA256

      f0cf462438fee1d63b901abf7c2537a489c13c5c217f93a64c94040a9ecb2b53

    • SHA512

      da72d00b302c7fa86489ce807f17fe2c83dba55c2e14819c832ff2ea90623d0b7f2e930f471e1bc7cc18dfae15fe14dd6a9880afd4556fb4b1f300466accedf0

    • SSDEEP

      12288:gO2C0F6a1a8LrerbvLrPsi5WmpYshXZPbGwidNpgw:d2CY6a1a2erjLTsi5WmD9idNpP

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks