General

  • Target

    5078d063a67d2d0374c98bbe99a73b12b203ddb303705ce0d00669b89c15fd2e.bin

  • Size

    644KB

  • Sample

    241209-1xjekssqgv

  • MD5

    d8146bb11257d085af0e33d3a6a67f94

  • SHA1

    05c77e2368103d035ec45ca20b72cbd231445ab4

  • SHA256

    5078d063a67d2d0374c98bbe99a73b12b203ddb303705ce0d00669b89c15fd2e

  • SHA512

    41f9e1306a368ad5596043e0b3cb9e617bc05727a58e39f740d7f7427e7f3abafba1882d276eb15540da7b3416fd9396e52fb4f906052f5d31400b7e0de50ae2

  • SSDEEP

    12288:yl+k56vg5bd5oSOG4AYDI1pTaawt6Rq21lusT3cgtN0FqgqhcSrtWDOwbIEkTl18:6zTUZdajwtGNlHT3SF3q6SgOLVM

Malware Config

Extracted

Family

spynote

C2

rew2266.ddns.net:2266

Extracted

Family

spynote

C2

rew2266.ddns.net:2266

Targets

    • Target

      5078d063a67d2d0374c98bbe99a73b12b203ddb303705ce0d00669b89c15fd2e.bin

    • Size

      644KB

    • MD5

      d8146bb11257d085af0e33d3a6a67f94

    • SHA1

      05c77e2368103d035ec45ca20b72cbd231445ab4

    • SHA256

      5078d063a67d2d0374c98bbe99a73b12b203ddb303705ce0d00669b89c15fd2e

    • SHA512

      41f9e1306a368ad5596043e0b3cb9e617bc05727a58e39f740d7f7427e7f3abafba1882d276eb15540da7b3416fd9396e52fb4f906052f5d31400b7e0de50ae2

    • SSDEEP

      12288:yl+k56vg5bd5oSOG4AYDI1pTaawt6Rq21lusT3cgtN0FqgqhcSrtWDOwbIEkTl18:6zTUZdajwtGNlHT3SF3q6SgOLVM

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Reads the content of the SMS messages.

    • Reads the content of the call log.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks