General

  • Target

    6f776aa6a65111d37c63d4bc16eb2fef12ab53a41b4d93469c969f1e5e81484b.bin

  • Size

    760KB

  • Sample

    241118-13gsyawdqg

  • MD5

    72bd35f4e36f366e45a88456c2b740a3

  • SHA1

    5548bea0dfee8a3dbd83671a9881a67a6cfb45e0

  • SHA256

    6f776aa6a65111d37c63d4bc16eb2fef12ab53a41b4d93469c969f1e5e81484b

  • SHA512

    0065df0dd1281be9ad4e32a54f8aefbd5d41e166a020b0f994494aeb5788eef3a50f3fa3dc806313dc06b1a5843ad190739188808b790983c8c6568011391bef

  • SSDEEP

    12288:mf3+nlsa1a8Lre8b6JGzf75WmpYshXZPbGwidNpgIO:mf3Pa1a2e8aGzf75WmD9idNppO

Malware Config

Extracted

Family

spynote

C2

192.168.0.107:9000

Targets

    • Target

      6f776aa6a65111d37c63d4bc16eb2fef12ab53a41b4d93469c969f1e5e81484b.bin

    • Size

      760KB

    • MD5

      72bd35f4e36f366e45a88456c2b740a3

    • SHA1

      5548bea0dfee8a3dbd83671a9881a67a6cfb45e0

    • SHA256

      6f776aa6a65111d37c63d4bc16eb2fef12ab53a41b4d93469c969f1e5e81484b

    • SHA512

      0065df0dd1281be9ad4e32a54f8aefbd5d41e166a020b0f994494aeb5788eef3a50f3fa3dc806313dc06b1a5843ad190739188808b790983c8c6568011391bef

    • SSDEEP

      12288:mf3+nlsa1a8Lre8b6JGzf75WmpYshXZPbGwidNpgIO:mf3Pa1a2e8aGzf75WmD9idNppO

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks