General

  • Target

    721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a.bin

  • Size

    760KB

  • Sample

    241219-1x3hfs1lc1

  • MD5

    fcf5431a0a9a07d39dc82c6f76b95f60

  • SHA1

    efada35a1b8bc2f53b4062bef5ddef3d5d41b2b4

  • SHA256

    721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a

  • SHA512

    358d876a0908ecc5cd66208f6a36e32dae2e1e6662c307a61cbb415f0c12796cf2b51bff4868b55d1aaf6f1e6b22dec78fdb5b375f2577076993894ab60194cf

  • SSDEEP

    12288:WEzuVxa1a8LdeANG4wYld5WmpYshXZPbGwidNpgsG+:WE8a1a6eARwYld5WmD9idNpZ

Malware Config

Extracted

Family

spynote

C2

list-return.gl.at.ply.gg:43911

Targets

    • Target

      721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a.bin

    • Size

      760KB

    • MD5

      fcf5431a0a9a07d39dc82c6f76b95f60

    • SHA1

      efada35a1b8bc2f53b4062bef5ddef3d5d41b2b4

    • SHA256

      721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a

    • SHA512

      358d876a0908ecc5cd66208f6a36e32dae2e1e6662c307a61cbb415f0c12796cf2b51bff4868b55d1aaf6f1e6b22dec78fdb5b375f2577076993894ab60194cf

    • SSDEEP

      12288:WEzuVxa1a8LdeANG4wYld5WmpYshXZPbGwidNpgsG+:WE8a1a6eARwYld5WmD9idNpZ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks