General

  • Target

    7da87e406a7de4c00e1c10c4a224048288fa6c2e99ac8214cb7aeab76c0971fd.bin

  • Size

    758KB

  • Sample

    241208-1zlmqazldp

  • MD5

    7c5e96a051c8b3031a76f7eb372ba2f4

  • SHA1

    00d7ba1ed57e0193f2f6341b492a65552bfa2685

  • SHA256

    7da87e406a7de4c00e1c10c4a224048288fa6c2e99ac8214cb7aeab76c0971fd

  • SHA512

    6d6ac46c0a6e4c42cf9987ec8631b7ba420bc715e35c350a01349e44dfc68340ddbf9da0e77c7d2d72e7aa595a8e397e8405af40977d321acfff1a9f61cee227

  • SSDEEP

    12288:1ra1a8LremfVPdF3MKCG5WmpYshXZPbGwidNpgq:Za1a2emfrFbCG5WmD9idNpF

Malware Config

Extracted

Family

spynote

C2

24.ip.gl.ply.gg:22375

Targets

    • Target

      7da87e406a7de4c00e1c10c4a224048288fa6c2e99ac8214cb7aeab76c0971fd.bin

    • Size

      758KB

    • MD5

      7c5e96a051c8b3031a76f7eb372ba2f4

    • SHA1

      00d7ba1ed57e0193f2f6341b492a65552bfa2685

    • SHA256

      7da87e406a7de4c00e1c10c4a224048288fa6c2e99ac8214cb7aeab76c0971fd

    • SHA512

      6d6ac46c0a6e4c42cf9987ec8631b7ba420bc715e35c350a01349e44dfc68340ddbf9da0e77c7d2d72e7aa595a8e397e8405af40977d321acfff1a9f61cee227

    • SSDEEP

      12288:1ra1a8LremfVPdF3MKCG5WmpYshXZPbGwidNpgq:Za1a2emfrFbCG5WmD9idNpF

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks