General

  • Target

    3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539.bin

  • Size

    760KB

  • Sample

    241209-1w72jssqft

  • MD5

    9b186aa2c7d60a63bf25b7ff0f5bf6d4

  • SHA1

    4844c4c0051270e6a6cb651b7105defe3c84e007

  • SHA256

    3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539

  • SHA512

    2b3f0ecebdf4a65747337465dbb73d22ff745e4ea9003232396920c4088c7ee311663a4bf0f76e990b311de6330615951c8b13342916360eb241b564db24f60d

  • SSDEEP

    12288:ZaQa1a8LzeKhomqzzX5WmpYshXZPbGwidNpgX:ta1ameKdqzzX5WmD9idNpk

Malware Config

Extracted

Family

spynote

C2

10.8.70.118:4586

Targets

    • Target

      3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539.bin

    • Size

      760KB

    • MD5

      9b186aa2c7d60a63bf25b7ff0f5bf6d4

    • SHA1

      4844c4c0051270e6a6cb651b7105defe3c84e007

    • SHA256

      3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539

    • SHA512

      2b3f0ecebdf4a65747337465dbb73d22ff745e4ea9003232396920c4088c7ee311663a4bf0f76e990b311de6330615951c8b13342916360eb241b564db24f60d

    • SSDEEP

      12288:ZaQa1a8LzeKhomqzzX5WmpYshXZPbGwidNpgX:ta1ameKdqzzX5WmD9idNpk

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks