General

  • Target

    client.apk

  • Size

    754KB

  • Sample

    241221-n86yssyqfs

  • MD5

    7aa2c84bbdf3a83ccc1b8c5fa13ee997

  • SHA1

    9fbdd98f2998021d8a496ae9e088a0bb9f277fe6

  • SHA256

    dad2596f9077bc14e41d81efbf016dc103b31094ae57200a36ee03ee1dd076a6

  • SHA512

    448e321ac49c9604c5aa18f7d07ab3ff68e6d3d205d4046ea968cbe9383034def40ae51a4b7c666d8a975fcc3a558a54b868ef56302cfe256a8ba4359a776f76

  • SSDEEP

    12288:R2fo8/BfvNldjdwNh1j8oSSoEQWPvdVDqFntOS37L:QfoAfvNTd8Xj8oSSoEBvdJCp37L

Malware Config

Extracted

Family

spynote

C2

science-attract.gl.at.ply.gg:13548

Targets

    • Target

      client.apk

    • Size

      754KB

    • MD5

      7aa2c84bbdf3a83ccc1b8c5fa13ee997

    • SHA1

      9fbdd98f2998021d8a496ae9e088a0bb9f277fe6

    • SHA256

      dad2596f9077bc14e41d81efbf016dc103b31094ae57200a36ee03ee1dd076a6

    • SHA512

      448e321ac49c9604c5aa18f7d07ab3ff68e6d3d205d4046ea968cbe9383034def40ae51a4b7c666d8a975fcc3a558a54b868ef56302cfe256a8ba4359a776f76

    • SSDEEP

      12288:R2fo8/BfvNldjdwNh1j8oSSoEQWPvdVDqFntOS37L:QfoAfvNTd8Xj8oSSoEBvdJCp37L

    • Removes its main activity from the application launcher

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks