General

  • Target

    ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4.bin

  • Size

    760KB

  • Sample

    241217-122fyszlhw

  • MD5

    e0a438105214931e5eaa867540ab2d14

  • SHA1

    e9a2f8a174cfc6b041569e652605633b9ac817ce

  • SHA256

    ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4

  • SHA512

    b71b308e1186dffffe232a8c0529448bbc4265948ecf2a972f98bb763a71fdbad7377cdfd0274406ce512f870f5168cd7fa844e3bec868bdfb538e3ed08e9191

  • SSDEEP

    12288:ZWOwoBZRvSMqrz/XXv7aoq5WmpYshXZPbGwidNpgYd:ZzBZRrqrLXzaoq5WmD9idNpjd

Malware Config

Extracted

Family

spynote

C2

server-adding.gl.at.ply.gg:1755

Targets

    • Target

      ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4.bin

    • Size

      760KB

    • MD5

      e0a438105214931e5eaa867540ab2d14

    • SHA1

      e9a2f8a174cfc6b041569e652605633b9ac817ce

    • SHA256

      ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4

    • SHA512

      b71b308e1186dffffe232a8c0529448bbc4265948ecf2a972f98bb763a71fdbad7377cdfd0274406ce512f870f5168cd7fa844e3bec868bdfb538e3ed08e9191

    • SSDEEP

      12288:ZWOwoBZRvSMqrz/XXv7aoq5WmpYshXZPbGwidNpgYd:ZzBZRrqrLXzaoq5WmD9idNpjd

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks