General

  • Target

    819b20a867ce9de8cbe8639adfe3623ff70b2eac17c4d4f10e6a917668451746.bin

  • Size

    760KB

  • Sample

    241222-1yjrqs1kdk

  • MD5

    101f79129e337fbacd90aa2a21880519

  • SHA1

    263ec87adf8ac8e557b6701b851a4ab929bc3461

  • SHA256

    819b20a867ce9de8cbe8639adfe3623ff70b2eac17c4d4f10e6a917668451746

  • SHA512

    c269b771dba050fc5245f4a4cde8edca0c81cfb60be691ba8f73b9bbd8d5b61d1bf89524b1291a3620367a57fb69c4c0deec01353d018a1167eb747abcf8405f

  • SSDEEP

    12288:nTdtOpLna1a8LzeJ5Px+rpIS5WmpYshXZPbGwidNpg15:nRtUa1ameJ5MrpIS5WmD9idNpA5

Malware Config

Extracted

Family

spynote

C2

26.243.159.253:8847

Targets

    • Target

      819b20a867ce9de8cbe8639adfe3623ff70b2eac17c4d4f10e6a917668451746.bin

    • Size

      760KB

    • MD5

      101f79129e337fbacd90aa2a21880519

    • SHA1

      263ec87adf8ac8e557b6701b851a4ab929bc3461

    • SHA256

      819b20a867ce9de8cbe8639adfe3623ff70b2eac17c4d4f10e6a917668451746

    • SHA512

      c269b771dba050fc5245f4a4cde8edca0c81cfb60be691ba8f73b9bbd8d5b61d1bf89524b1291a3620367a57fb69c4c0deec01353d018a1167eb747abcf8405f

    • SSDEEP

      12288:nTdtOpLna1a8LzeJ5Px+rpIS5WmpYshXZPbGwidNpg15:nRtUa1ameJ5MrpIS5WmD9idNpA5

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks