General

  • Target

    f699fb7acf6bd393e059ad9b0e98f5640b448e7dfabaab6f398b284d1349ac0a.bin

  • Size

    760KB

  • Sample

    241215-1ymtds1jgp

  • MD5

    8fc1803f2c597872925852ee4ebff9ae

  • SHA1

    f96f7443080fbc35b0fcc1dbf4311b717852cef1

  • SHA256

    f699fb7acf6bd393e059ad9b0e98f5640b448e7dfabaab6f398b284d1349ac0a

  • SHA512

    91d454a94681e7268c323bb5e83da35aa286e90b104f9ef256373a04021a257dcae49d951443c96d4af8f92eddf9a76a212fdb1f4da84e18f5b97c63d17022c1

  • SSDEEP

    12288:uczE7uMda1a8LVeOkvVISg5WmpYshXZPbGwidNpg83:uL/a1aKeO2VISg5WmD9idNpz

Malware Config

Extracted

Family

spynote

C2

192.168.1.3:3333

Targets

    • Target

      f699fb7acf6bd393e059ad9b0e98f5640b448e7dfabaab6f398b284d1349ac0a.bin

    • Size

      760KB

    • MD5

      8fc1803f2c597872925852ee4ebff9ae

    • SHA1

      f96f7443080fbc35b0fcc1dbf4311b717852cef1

    • SHA256

      f699fb7acf6bd393e059ad9b0e98f5640b448e7dfabaab6f398b284d1349ac0a

    • SHA512

      91d454a94681e7268c323bb5e83da35aa286e90b104f9ef256373a04021a257dcae49d951443c96d4af8f92eddf9a76a212fdb1f4da84e18f5b97c63d17022c1

    • SSDEEP

      12288:uczE7uMda1a8LVeOkvVISg5WmpYshXZPbGwidNpg83:uL/a1aKeO2VISg5WmD9idNpz

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks