General

  • Target

    087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1.bin

  • Size

    760KB

  • Sample

    241229-1yq6taxrex

  • MD5

    e2c769c36983395783edbd3d0e49d020

  • SHA1

    562f4a3dfa4e74e06be320c4ad37ad1ceb21af20

  • SHA256

    087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1

  • SHA512

    43e37883486f8633f01fc2bf9a436fb148f4de4bac292f01abba2cb83c9f7db4402f700928bd05c52535ed4b5e3328dcfae4ad8a68578333bba0b87e854ecf26

  • SSDEEP

    12288:wugitv3BZRvS0qFWNGbmYt5WmpYshXZPbGwidNpgB:wFiRBZRrqFZbmYt5WmD9idNpu

Malware Config

Extracted

Family

spynote

C2

key-graphics.gl.at.ply.gg:47041

Targets

    • Target

      087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1.bin

    • Size

      760KB

    • MD5

      e2c769c36983395783edbd3d0e49d020

    • SHA1

      562f4a3dfa4e74e06be320c4ad37ad1ceb21af20

    • SHA256

      087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1

    • SHA512

      43e37883486f8633f01fc2bf9a436fb148f4de4bac292f01abba2cb83c9f7db4402f700928bd05c52535ed4b5e3328dcfae4ad8a68578333bba0b87e854ecf26

    • SSDEEP

      12288:wugitv3BZRvS0qFWNGbmYt5WmpYshXZPbGwidNpgB:wFiRBZRrqFZbmYt5WmD9idNpu

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks