General

  • Target

    92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f.bin

  • Size

    787KB

  • Sample

    241117-13w8mazarf

  • MD5

    be2033de8cfe17f674187963c64569d5

  • SHA1

    436026fa8c25ae0dbefd1d97c34bb94f5aa42526

  • SHA256

    92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f

  • SHA512

    66f3f2689064ba0f0ac608f4cbb6394260045a982240cc6aeccc3e3f4e320f7cc942551bb5d14c8696c682d0e5243d9d914adfff43a1ae51b0994bcd4fbcb995

  • SSDEEP

    12288:AaO+dUa1a8LzehNXkZ2Nufy75WmpYshXZPbGwidNpgn:2IUa1amehN0Z2NEy75WmD9idNpE

Malware Config

Extracted

Family

spynote

C2

bgjkafw.localto.net:8464

Targets

    • Target

      92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f.bin

    • Size

      787KB

    • MD5

      be2033de8cfe17f674187963c64569d5

    • SHA1

      436026fa8c25ae0dbefd1d97c34bb94f5aa42526

    • SHA256

      92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f

    • SHA512

      66f3f2689064ba0f0ac608f4cbb6394260045a982240cc6aeccc3e3f4e320f7cc942551bb5d14c8696c682d0e5243d9d914adfff43a1ae51b0994bcd4fbcb995

    • SSDEEP

      12288:AaO+dUa1a8LzehNXkZ2Nufy75WmpYshXZPbGwidNpgn:2IUa1amehN0Z2NEy75WmD9idNpE

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks