General

  • Target

    f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69.bin

  • Size

    1.2MB

  • Sample

    241204-12vcmstnaz

  • MD5

    f9e80cbe1b4b7bae80fa1149b8825f61

  • SHA1

    22f6924c8105206d57d1b4c3c7d017f07ba4b20a

  • SHA256

    f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69

  • SHA512

    8993925bb3b5533dcce53b3c3930abc5196219a960b763b8129edaaa74ba0ef904384825a9991e252c939315e4ae8987cd518d0f1edd9ddbff190675dd54d2b9

  • SSDEEP

    24576:s3yw0ES+rG3mcHNA34qpa3UnVVxv4A1RyYYgJPdJ3FP6JoR1:s3yw0E5r2muaBpYUnN1RyYYgJP7EJs

Malware Config

Extracted

Family

spynote

C2

cy.alhaneny.com:1150

Targets

    • Target

      f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69.bin

    • Size

      1.2MB

    • MD5

      f9e80cbe1b4b7bae80fa1149b8825f61

    • SHA1

      22f6924c8105206d57d1b4c3c7d017f07ba4b20a

    • SHA256

      f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69

    • SHA512

      8993925bb3b5533dcce53b3c3930abc5196219a960b763b8129edaaa74ba0ef904384825a9991e252c939315e4ae8987cd518d0f1edd9ddbff190675dd54d2b9

    • SSDEEP

      24576:s3yw0ES+rG3mcHNA34qpa3UnVVxv4A1RyYYgJPdJ3FP6JoR1:s3yw0E5r2muaBpYUnN1RyYYgJP7EJs

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks