General

  • Target

    646fa8567ad6199607d0ca681422a61984cd70fd77fa89374f8cd21a466a72a5.bin

  • Size

    760KB

  • Sample

    241127-1yj3hasncv

  • MD5

    c364830cec67974cd5dc3c848f5a6015

  • SHA1

    522dbdc67d3f524246981700e9ae3d9234dc1024

  • SHA256

    646fa8567ad6199607d0ca681422a61984cd70fd77fa89374f8cd21a466a72a5

  • SHA512

    786132a4db29ebc4e7f7c2d2d2fcfbc54897d66090ebe2e66170ae6cb0c3671916c2b979e66b8a9c8348e2373e1c43f4deface1414f88332985368c02aac4ea4

  • SSDEEP

    12288:YaEGTbabJ6sgR8LzSpUe6Yzb5WmpYshXZPbGwidNpgv:YaiJ6stLzSB6Yzb5WmD9idNpw

Malware Config

Extracted

Family

spynote

C2

gabeu15.localto.net:5534

Targets

    • Target

      646fa8567ad6199607d0ca681422a61984cd70fd77fa89374f8cd21a466a72a5.bin

    • Size

      760KB

    • MD5

      c364830cec67974cd5dc3c848f5a6015

    • SHA1

      522dbdc67d3f524246981700e9ae3d9234dc1024

    • SHA256

      646fa8567ad6199607d0ca681422a61984cd70fd77fa89374f8cd21a466a72a5

    • SHA512

      786132a4db29ebc4e7f7c2d2d2fcfbc54897d66090ebe2e66170ae6cb0c3671916c2b979e66b8a9c8348e2373e1c43f4deface1414f88332985368c02aac4ea4

    • SSDEEP

      12288:YaEGTbabJ6sgR8LzSpUe6Yzb5WmpYshXZPbGwidNpgv:YaiJ6stLzSB6Yzb5WmD9idNpw

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks