General

  • Target

    7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12.bin

  • Size

    760KB

  • Sample

    241218-1ytxpsvjfj

  • MD5

    3a0672ee9a000648bd3865ecc80f4ed8

  • SHA1

    ccd9f25b18fa4841970c7f6c5a3294d14ce80f9d

  • SHA256

    7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12

  • SHA512

    21ff2d65c2e51257dac511f5286e77807d3ab963056b7ef893f9a8c0919f96eb9c9d0be93b5bb5c9703793d103cc581dc8734444e80e1b1a0fa1c35ff85fbae8

  • SSDEEP

    12288:2Q1DTcdAa1a8LzeVhdknhom5WmpYshXZPbGwidNpgGx:2Q1OAa1ameVknhom5WmD9idNpH

Malware Config

Extracted

Family

spynote

C2

4.tcp.eu.ngrok.io:11200

Targets

    • Target

      7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12.bin

    • Size

      760KB

    • MD5

      3a0672ee9a000648bd3865ecc80f4ed8

    • SHA1

      ccd9f25b18fa4841970c7f6c5a3294d14ce80f9d

    • SHA256

      7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12

    • SHA512

      21ff2d65c2e51257dac511f5286e77807d3ab963056b7ef893f9a8c0919f96eb9c9d0be93b5bb5c9703793d103cc581dc8734444e80e1b1a0fa1c35ff85fbae8

    • SSDEEP

      12288:2Q1DTcdAa1a8LzeVhdknhom5WmpYshXZPbGwidNpgGx:2Q1OAa1ameVknhom5WmD9idNpH

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Legitimate hosting services abused for malware hosting/C2

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks