General

  • Target

    a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640.bin

  • Size

    792KB

  • Sample

    241229-1xxxzaxrhq

  • MD5

    933ed9c10630b5404cac69d59499fb4d

  • SHA1

    314bfeacc2948c03efce670bef14e513fee53880

  • SHA256

    a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640

  • SHA512

    82ecc6ab00e19e56b27560bc7697cbc7e86fe41b4a895e44ca6de5329ccee519e4efb97ecab74b5521dce394cd830dcbcf164fdd8396914a942acb1327b0cc64

  • SSDEEP

    12288:8Qta1a8LzejFKxthS15WmpYshXZPbGwidNpgl:84a1amejcxvS15WmD9idNpW

Malware Config

Extracted

Family

spynote

C2

7.tcp.eu.ngrok.io:16642

Targets

    • Target

      a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640.bin

    • Size

      792KB

    • MD5

      933ed9c10630b5404cac69d59499fb4d

    • SHA1

      314bfeacc2948c03efce670bef14e513fee53880

    • SHA256

      a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640

    • SHA512

      82ecc6ab00e19e56b27560bc7697cbc7e86fe41b4a895e44ca6de5329ccee519e4efb97ecab74b5521dce394cd830dcbcf164fdd8396914a942acb1327b0cc64

    • SSDEEP

      12288:8Qta1a8LzejFKxthS15WmpYshXZPbGwidNpgl:84a1amejcxvS15WmD9idNpW

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks