General

  • Target

    bbfd5e5d8b33b1abee61820445f7fe6f395f698dae213a5c7f9502792b3fb05e.bin

  • Size

    877KB

  • Sample

    241207-1y5n7swmgy

  • MD5

    d516de099bc21a9725c935874f978f83

  • SHA1

    e13ce3f1ce685e06b1fdd94e39598d6f69cd1727

  • SHA256

    bbfd5e5d8b33b1abee61820445f7fe6f395f698dae213a5c7f9502792b3fb05e

  • SHA512

    5c55bc1a3a8a406067d014aaf5926ee2be2aedeaf3bf0a6e72e7c7aa33fce201543cc31cad278e5a0e55016ea07fa7d75fd4ff61a0acfd6e51d3affed53889f8

  • SSDEEP

    12288:74hbdSa1a8Lzebq67uDO1is13G45WmpYshXZPbGwidNpgY:74vSa1amebq4p1isRG45WmD9idNpD

Malware Config

Extracted

Family

spynote

C2

188.120.241.61:777

Targets

    • Target

      bbfd5e5d8b33b1abee61820445f7fe6f395f698dae213a5c7f9502792b3fb05e.bin

    • Size

      877KB

    • MD5

      d516de099bc21a9725c935874f978f83

    • SHA1

      e13ce3f1ce685e06b1fdd94e39598d6f69cd1727

    • SHA256

      bbfd5e5d8b33b1abee61820445f7fe6f395f698dae213a5c7f9502792b3fb05e

    • SHA512

      5c55bc1a3a8a406067d014aaf5926ee2be2aedeaf3bf0a6e72e7c7aa33fce201543cc31cad278e5a0e55016ea07fa7d75fd4ff61a0acfd6e51d3affed53889f8

    • SSDEEP

      12288:74hbdSa1a8Lzebq67uDO1is13G45WmpYshXZPbGwidNpgY:74vSa1amebq4p1isRG45WmD9idNpD

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks