General

  • Target

    4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494.bin

  • Size

    760KB

  • Sample

    241229-1xhhaaxrgk

  • MD5

    e5a5ca1d36f185e42529c732e99225a1

  • SHA1

    1ee5ae53d36c7143d734d31425a63873905092b7

  • SHA256

    4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494

  • SHA512

    8d9628459746321f570e067efd2991290fccd9309eea52e1be0f4a20535ee1eebda17e93cb1314dd466061a46ba1ca74162c705cf59426e2e9820c299cd122c6

  • SSDEEP

    12288:KL+htS3ca1a8LVeQMq3igXc5WmpYshXZPbGwidNpgK:KLPsa1aKeQTigXc5WmD9idNpV

Malware Config

Extracted

Family

spynote

C2

deda-178-90-26-163.ngrok-free.app:8080

Targets

    • Target

      4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494.bin

    • Size

      760KB

    • MD5

      e5a5ca1d36f185e42529c732e99225a1

    • SHA1

      1ee5ae53d36c7143d734d31425a63873905092b7

    • SHA256

      4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494

    • SHA512

      8d9628459746321f570e067efd2991290fccd9309eea52e1be0f4a20535ee1eebda17e93cb1314dd466061a46ba1ca74162c705cf59426e2e9820c299cd122c6

    • SSDEEP

      12288:KL+htS3ca1a8LVeQMq3igXc5WmpYshXZPbGwidNpgK:KLPsa1aKeQTigXc5WmD9idNpV

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks