General

  • Target

    0e5c0c939bbc967c0ed8a2b2e412845861ef3bfdfe7c7652335b7703b9015154.bin

  • Size

    758KB

  • Sample

    241124-1zk17askfv

  • MD5

    822bf2c0c7da52ca023af9f839c70f07

  • SHA1

    8b0ebe4f3429c2f96b769a4c7629fe39a0037c87

  • SHA256

    0e5c0c939bbc967c0ed8a2b2e412845861ef3bfdfe7c7652335b7703b9015154

  • SHA512

    95c9582b0688bdfff6e0ddb15b3d6b4ec2268905472cd41db83dad888975560ce62fffe1b8231718852e99745b389085b310f90c5f19f9491aebcc4cb8ce3306

  • SSDEEP

    12288:CsHa1a8LVeWNQjo1cFcS5WmpYshXZPbGwidNpg4:fHa1aKe6mo+Fh5WmD9idNpP

Malware Config

Extracted

Family

spynote

C2

192.168.133.121:4444

Targets

    • Target

      0e5c0c939bbc967c0ed8a2b2e412845861ef3bfdfe7c7652335b7703b9015154.bin

    • Size

      758KB

    • MD5

      822bf2c0c7da52ca023af9f839c70f07

    • SHA1

      8b0ebe4f3429c2f96b769a4c7629fe39a0037c87

    • SHA256

      0e5c0c939bbc967c0ed8a2b2e412845861ef3bfdfe7c7652335b7703b9015154

    • SHA512

      95c9582b0688bdfff6e0ddb15b3d6b4ec2268905472cd41db83dad888975560ce62fffe1b8231718852e99745b389085b310f90c5f19f9491aebcc4cb8ce3306

    • SSDEEP

      12288:CsHa1a8LVeWNQjo1cFcS5WmpYshXZPbGwidNpg4:fHa1aKe6mo+Fh5WmD9idNpP

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks