General

  • Target

    19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e.bin

  • Size

    792KB

  • Sample

    241230-1y5zza1kem

  • MD5

    030313fb11b9d2882933cb808f629d4f

  • SHA1

    82c3fa3e15aab34c068c241bdb41c9b3bf8f205f

  • SHA256

    19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e

  • SHA512

    b510d7b0b599cd6ebc8e0980437d02a6e34e47b59096240da76a69ecdd0271139a7c7ca7e416166959886d3874fe84c0a9d9d0fcfacae9df257a3433d2180323

  • SSDEEP

    12288:oOCkia1a8LVeUKO+narZ45WmpYshXZPbGwidNpgje:Mza1aKeUJ+arZ45WmD9idNpMe

Malware Config

Extracted

Family

spynote

C2

break-lounge.gl.at.ply.gg:47852

Targets

    • Target

      19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e.bin

    • Size

      792KB

    • MD5

      030313fb11b9d2882933cb808f629d4f

    • SHA1

      82c3fa3e15aab34c068c241bdb41c9b3bf8f205f

    • SHA256

      19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e

    • SHA512

      b510d7b0b599cd6ebc8e0980437d02a6e34e47b59096240da76a69ecdd0271139a7c7ca7e416166959886d3874fe84c0a9d9d0fcfacae9df257a3433d2180323

    • SSDEEP

      12288:oOCkia1a8LVeUKO+narZ45WmpYshXZPbGwidNpgje:Mza1aKeUJ+arZ45WmD9idNpMe

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks