General

  • Target

    7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f.bin

  • Size

    758KB

  • Sample

    241123-1yrscayngw

  • MD5

    07c8fd6b64f7684358faac2e62c84d07

  • SHA1

    4f206b9ed20ff698852750a96267e8a3ed77c56f

  • SHA256

    7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f

  • SHA512

    48269e258a0ffea1f24835982f1dea6b031cf7a2a72971a73a696d2526d9cdc837e2c05e2146f13aca9f08f5e9eea8c207b018688bb434fa6a129ea6988c9c77

  • SSDEEP

    12288:oJaBOa1a8Ldeg4Wr8R9IS5WmpYshXZPbGwidNpgwtB:Cha1a6egzr8R9IS5WmD9idNpBtB

Malware Config

Extracted

Family

spynote

C2

callrat-33839.portmap.host:33839

Targets

    • Target

      7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f.bin

    • Size

      758KB

    • MD5

      07c8fd6b64f7684358faac2e62c84d07

    • SHA1

      4f206b9ed20ff698852750a96267e8a3ed77c56f

    • SHA256

      7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f

    • SHA512

      48269e258a0ffea1f24835982f1dea6b031cf7a2a72971a73a696d2526d9cdc837e2c05e2146f13aca9f08f5e9eea8c207b018688bb434fa6a129ea6988c9c77

    • SSDEEP

      12288:oJaBOa1a8Ldeg4Wr8R9IS5WmpYshXZPbGwidNpgwtB:Cha1a6egzr8R9IS5WmD9idNpBtB

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks