General

  • Target

    b95830fb7bcd2ef0ae1cd4f768340a2cc8849b98853b5ccfca7f6a7f1d556ce0.bin

  • Size

    787KB

  • Sample

    241221-142vha1qej

  • MD5

    35bfa99e1a5cc444835665ebaf2e8950

  • SHA1

    cd6ec2525703870e68f6fa1572b4be838accd740

  • SHA256

    b95830fb7bcd2ef0ae1cd4f768340a2cc8849b98853b5ccfca7f6a7f1d556ce0

  • SHA512

    dbec8b23c0ae491508ed59c6ef39f9cb3a4a0fbe19856e65b161ad38e4d410e78df6da25ccd1ce9431151f8d160cc2c41877772e90aef08b6a1d4d1a22ef5628

  • SSDEEP

    12288:4OyWmJ6sgRsLzpwjGsKoITo3J5WmpYshXZPbGwidNpgs:VOJ6sFLzp+7KD83J5WmD9idNpH

Malware Config

Extracted

Family

spynote

C2

zlobniykot007-20173.portmap.host:20173

Targets

    • Target

      b95830fb7bcd2ef0ae1cd4f768340a2cc8849b98853b5ccfca7f6a7f1d556ce0.bin

    • Size

      787KB

    • MD5

      35bfa99e1a5cc444835665ebaf2e8950

    • SHA1

      cd6ec2525703870e68f6fa1572b4be838accd740

    • SHA256

      b95830fb7bcd2ef0ae1cd4f768340a2cc8849b98853b5ccfca7f6a7f1d556ce0

    • SHA512

      dbec8b23c0ae491508ed59c6ef39f9cb3a4a0fbe19856e65b161ad38e4d410e78df6da25ccd1ce9431151f8d160cc2c41877772e90aef08b6a1d4d1a22ef5628

    • SSDEEP

      12288:4OyWmJ6sgRsLzpwjGsKoITo3J5WmpYshXZPbGwidNpgs:VOJ6sFLzp+7KD83J5WmD9idNpH

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks