General

  • Target

    fb1b1c472838bac85080d644782ffa23b63773a1c73927d8e3b7270f6d63549d

  • Size

    5.6MB

  • Sample

    241203-tekrcsxncn

  • MD5

    91b5aea58d6c1a318cb130b584e33749

  • SHA1

    8a5ba4622f1c7af069aaba48beeb5556ca2ee354

  • SHA256

    fb1b1c472838bac85080d644782ffa23b63773a1c73927d8e3b7270f6d63549d

  • SHA512

    78406defdbff2586e0e26d556d1108247762c2bd00c5563c985e049e52ec24d07a5f91fac9ca5f94cd2a0fb6a03bdbb2e0c3fa9129cf1ab7f31a8452c5e666fd

  • SSDEEP

    98304:McjMPjzBDTW0tPmzyDKWs6VL24uRPG0JZtYoz61TVDJzDHtkIbvZS+BRGT:ZjG1dezyOWXL24uRXtYauRDJzDPZS+bC

Malware Config

Extracted

Family

spynote

C2

ho1hm2.ddns.net:44414

Targets

    • Target

      fb1b1c472838bac85080d644782ffa23b63773a1c73927d8e3b7270f6d63549d

    • Size

      5.6MB

    • MD5

      91b5aea58d6c1a318cb130b584e33749

    • SHA1

      8a5ba4622f1c7af069aaba48beeb5556ca2ee354

    • SHA256

      fb1b1c472838bac85080d644782ffa23b63773a1c73927d8e3b7270f6d63549d

    • SHA512

      78406defdbff2586e0e26d556d1108247762c2bd00c5563c985e049e52ec24d07a5f91fac9ca5f94cd2a0fb6a03bdbb2e0c3fa9129cf1ab7f31a8452c5e666fd

    • SSDEEP

      98304:McjMPjzBDTW0tPmzyDKWs6VL24uRPG0JZtYoz61TVDJzDHtkIbvZS+BRGT:ZjG1dezyOWXL24uRXtYauRDJzDPZS+bC

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks