General

  • Target

    affa9c4dbdb1f16d0e8b96c0f1f47181587298ba02ab70d32f8a844a14c8cfc8.bin

  • Size

    768KB

  • Sample

    241224-1w1bpsymhn

  • MD5

    99dc6809f467f7fd476c6695a7ea0097

  • SHA1

    207e56255e9fea59e6b157303a164f9df8bce25f

  • SHA256

    affa9c4dbdb1f16d0e8b96c0f1f47181587298ba02ab70d32f8a844a14c8cfc8

  • SHA512

    a808a70727f8c7d853e7caf6fa7ffea40246e511dc4797a1a6f59cd0a485ce2dcc8328be53055e0ad16c6e856732046d828879ec3cedd8c5b8e157ad00168741

  • SSDEEP

    12288:9PhwUsqa1a8Lze4yVvwMmQbz5WmpYshXZPbGwidNpgP:9Phuqa1ame4evhmQbz5WmD9idNpI

Malware Config

Extracted

Family

spynote

C2

pics-let.gl.at.ply.gg:5225

Targets

    • Target

      affa9c4dbdb1f16d0e8b96c0f1f47181587298ba02ab70d32f8a844a14c8cfc8.bin

    • Size

      768KB

    • MD5

      99dc6809f467f7fd476c6695a7ea0097

    • SHA1

      207e56255e9fea59e6b157303a164f9df8bce25f

    • SHA256

      affa9c4dbdb1f16d0e8b96c0f1f47181587298ba02ab70d32f8a844a14c8cfc8

    • SHA512

      a808a70727f8c7d853e7caf6fa7ffea40246e511dc4797a1a6f59cd0a485ce2dcc8328be53055e0ad16c6e856732046d828879ec3cedd8c5b8e157ad00168741

    • SSDEEP

      12288:9PhwUsqa1a8Lze4yVvwMmQbz5WmpYshXZPbGwidNpgP:9Phuqa1ame4evhmQbz5WmD9idNpI

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks