General

  • Target

    a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506.bin

  • Size

    850KB

  • Sample

    241205-1xe26azqen

  • MD5

    89e6675e6d17965936c3bd4a4905920b

  • SHA1

    870ed68989ccee75682a15054f2d887388615c3e

  • SHA256

    a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506

  • SHA512

    98e69cde3c47a3d93b61113095c0e4d9779bf9e9278def3366bf49a38068e533893cfb79386cacf4ec680e6b06a67c9470e5d0291cf59a0479fdaada6143e566

  • SSDEEP

    24576:eda1amemzMbm06c/dHmVX05WmD9idNpg4:ua1aKzyj/VhWk0d/1

Malware Config

Extracted

Family

spynote

C2

badr001.ddns.net:4444

Targets

    • Target

      a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506.bin

    • Size

      850KB

    • MD5

      89e6675e6d17965936c3bd4a4905920b

    • SHA1

      870ed68989ccee75682a15054f2d887388615c3e

    • SHA256

      a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506

    • SHA512

      98e69cde3c47a3d93b61113095c0e4d9779bf9e9278def3366bf49a38068e533893cfb79386cacf4ec680e6b06a67c9470e5d0291cf59a0479fdaada6143e566

    • SSDEEP

      24576:eda1amemzMbm06c/dHmVX05WmD9idNpg4:ua1aKzyj/VhWk0d/1

    • Removes its main activity from the application launcher

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks