General

  • Target

    cd9c8be4b5c342ff96c3592dd0d0d40527d4c03ac8d1dd36dd86705ac53e91bc.bin

  • Size

    644KB

  • Sample

    241202-1x4qhsvnex

  • MD5

    bbdaf045aea77f70d04542b6aef39cdb

  • SHA1

    e06e96a039436001d21f9aaecb9e9707bf963775

  • SHA256

    cd9c8be4b5c342ff96c3592dd0d0d40527d4c03ac8d1dd36dd86705ac53e91bc

  • SHA512

    3f1f1196700bdabd808d6c9a3f27894d3df332dae19414904b6664265d82bc05c065d9094f179d62790b83ace30cfba8e277b8d7258e37bf6268e75f775f26d7

  • SSDEEP

    12288:ULbn4cTJseyvwAbSvlef5uveK5YrpQaawt6Rq21lusT3cgtN0FqgqhcSrtWDOwb2:+743eX/u5ubs0wtGNlHT3SF3q6SgOLxR

Malware Config

Extracted

Family

spynote

C2

rew2266.ddns.net:2266

Extracted

Family

spynote

C2

rew2266.ddns.net:2266

Targets

    • Target

      cd9c8be4b5c342ff96c3592dd0d0d40527d4c03ac8d1dd36dd86705ac53e91bc.bin

    • Size

      644KB

    • MD5

      bbdaf045aea77f70d04542b6aef39cdb

    • SHA1

      e06e96a039436001d21f9aaecb9e9707bf963775

    • SHA256

      cd9c8be4b5c342ff96c3592dd0d0d40527d4c03ac8d1dd36dd86705ac53e91bc

    • SHA512

      3f1f1196700bdabd808d6c9a3f27894d3df332dae19414904b6664265d82bc05c065d9094f179d62790b83ace30cfba8e277b8d7258e37bf6268e75f775f26d7

    • SSDEEP

      12288:ULbn4cTJseyvwAbSvlef5uveK5YrpQaawt6Rq21lusT3cgtN0FqgqhcSrtWDOwb2:+743eX/u5ubs0wtGNlHT3SF3q6SgOLxR

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Reads the content of the SMS messages.

    • Reads the content of the call log.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks