General

  • Target

    9bf275dd26986e4cc48e7fa89653b459fe5694a0b4ad9f2db3fd93bb9f844468.bin

  • Size

    784KB

  • Sample

    241205-1y9m6atqax

  • MD5

    a474b9ab4b75c84cd8c0fa338c6cee13

  • SHA1

    f9e64eaa92f6e589f2226a3451f9d02b3ddcbe87

  • SHA256

    9bf275dd26986e4cc48e7fa89653b459fe5694a0b4ad9f2db3fd93bb9f844468

  • SHA512

    98df3f47ebfc3b3a560e2eb4c6973c7b9ed07fcd2e4c8c8b4634b148ca1303bc235e81df37f6481ca123525407dc0295f48bb1d06c9ba84d0c0df7c14e036775

  • SSDEEP

    12288:WNxMa1a8LzeFNUHIqNY5WmpYshXZPbGwidNpgR:Wca1ameFNWIqNY5WmD9idNpm

Malware Config

Extracted

Family

spynote

C2

york-las.gl.at.ply.gg:42607

Targets

    • Target

      9bf275dd26986e4cc48e7fa89653b459fe5694a0b4ad9f2db3fd93bb9f844468.bin

    • Size

      784KB

    • MD5

      a474b9ab4b75c84cd8c0fa338c6cee13

    • SHA1

      f9e64eaa92f6e589f2226a3451f9d02b3ddcbe87

    • SHA256

      9bf275dd26986e4cc48e7fa89653b459fe5694a0b4ad9f2db3fd93bb9f844468

    • SHA512

      98df3f47ebfc3b3a560e2eb4c6973c7b9ed07fcd2e4c8c8b4634b148ca1303bc235e81df37f6481ca123525407dc0295f48bb1d06c9ba84d0c0df7c14e036775

    • SSDEEP

      12288:WNxMa1a8LzeFNUHIqNY5WmpYshXZPbGwidNpgR:Wca1ameFNWIqNY5WmD9idNpm

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks