General

  • Target

    b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94.bin

  • Size

    747KB

  • Sample

    241231-1yjrqstqcm

  • MD5

    2930e61d83cedefb9bbc193740887ca3

  • SHA1

    5bcf31b35feedf3f3ec148e87117243f9424f030

  • SHA256

    b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94

  • SHA512

    d4d2cec95f2e0cb6e5cd5fa4127e0af0ae3a1f0a82a1a34dd92263bd5ae393e483112332d3e49eed927f44ebdb7421c8745c1f6d30d23bfd0e1a624a33a55ffe

  • SSDEEP

    12288:8+a1a8LzeJQQRDf95WmpYshXZPbGwidNpgKU:ja1ameJJRDf95WmD9idNp5U

Malware Config

Extracted

Family

spynote

C2

break-lounge.gl.at.ply.gg:47852

Targets

    • Target

      b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94.bin

    • Size

      747KB

    • MD5

      2930e61d83cedefb9bbc193740887ca3

    • SHA1

      5bcf31b35feedf3f3ec148e87117243f9424f030

    • SHA256

      b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94

    • SHA512

      d4d2cec95f2e0cb6e5cd5fa4127e0af0ae3a1f0a82a1a34dd92263bd5ae393e483112332d3e49eed927f44ebdb7421c8745c1f6d30d23bfd0e1a624a33a55ffe

    • SSDEEP

      12288:8+a1a8LzeJQQRDf95WmpYshXZPbGwidNpgKU:ja1ameJJRDf95WmD9idNp5U

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks