General

  • Target

    de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a.bin

  • Size

    760KB

  • Sample

    241204-11ewkatmcz

  • MD5

    5c5051e7a41b50b71f408bb66564c93b

  • SHA1

    83490bd50a6035272bd54de417537c05ae06949c

  • SHA256

    de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a

  • SHA512

    da1328abab00e97d273bfb6fdf016018a05c9f27cdc3cb76277719b2ad3d6fc1fbf18a84a354921cb4fe93974b37dcfd55db4b1a179d280ed6007447b6c3fe61

  • SSDEEP

    12288:Ap5232a1a8LVeCJEe6VxDL5WmpYshXZPbGwidNpgp:Apha1aKeCB6/DL5WmD9idNpi

Malware Config

Extracted

Family

spynote

C2

22.ip.gl.ply.gg:31255

Targets

    • Target

      de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a.bin

    • Size

      760KB

    • MD5

      5c5051e7a41b50b71f408bb66564c93b

    • SHA1

      83490bd50a6035272bd54de417537c05ae06949c

    • SHA256

      de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a

    • SHA512

      da1328abab00e97d273bfb6fdf016018a05c9f27cdc3cb76277719b2ad3d6fc1fbf18a84a354921cb4fe93974b37dcfd55db4b1a179d280ed6007447b6c3fe61

    • SSDEEP

      12288:Ap5232a1a8LVeCJEe6VxDL5WmpYshXZPbGwidNpgp:Apha1aKeCB6/DL5WmD9idNpi

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks