General

  • Target

    8704139a592c0e0da5ef4d60387b912e3df53935d158fc4c6c90759dff306591.bin

  • Size

    760KB

  • Sample

    241226-c8f7lavmht

  • MD5

    b96a945c7d50db64fd5101d08a79c0af

  • SHA1

    904e3e7ccf420a31d27a66034dd19467ade25d9b

  • SHA256

    8704139a592c0e0da5ef4d60387b912e3df53935d158fc4c6c90759dff306591

  • SHA512

    537cf7057abbbf4473633bbbe5ec7c627e57465cab2f7b9de1ee44242271bce4b7e32e5a57de8489b2d856cb7db4f7dd2d40fc4c820104b13f0b6b41c3311358

  • SSDEEP

    12288:MYTKFRaa1a8Lrey/0ncrR15WmpYshXZPbGwidNpgcEM:MYTKKa1a2eymcrR15WmD9idNpp

Malware Config

Extracted

Family

spynote

C2

learning-trade.gl.at.ply.gg:30123

Targets

    • Target

      8704139a592c0e0da5ef4d60387b912e3df53935d158fc4c6c90759dff306591.bin

    • Size

      760KB

    • MD5

      b96a945c7d50db64fd5101d08a79c0af

    • SHA1

      904e3e7ccf420a31d27a66034dd19467ade25d9b

    • SHA256

      8704139a592c0e0da5ef4d60387b912e3df53935d158fc4c6c90759dff306591

    • SHA512

      537cf7057abbbf4473633bbbe5ec7c627e57465cab2f7b9de1ee44242271bce4b7e32e5a57de8489b2d856cb7db4f7dd2d40fc4c820104b13f0b6b41c3311358

    • SSDEEP

      12288:MYTKFRaa1a8Lrey/0ncrR15WmpYshXZPbGwidNpgcEM:MYTKKa1a2eymcrR15WmD9idNpp

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks