General

  • Target

    ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a.bin

  • Size

    760KB

  • Sample

    250101-1w1x8swqes

  • MD5

    6e4a08d8ed87d579e7324ff5b3efdbd3

  • SHA1

    cdd318b379bb2d76c86d92535ea3bc48b4161eb8

  • SHA256

    ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a

  • SHA512

    1d754567914ba39b7280d68fa55dfc94cfdd41fd9d65eb46a9c9115c17d831bdd2a377c8528ab18dcb3bca7b943b069411216d50ce5e2d2919f402ee57d9be49

  • SSDEEP

    12288:6rBz2mfJ6sgRQLzW6wO8par5WmpYshXZPbGwidNpglM:6FztJ6sjLzWe8par5WmD9idNpp

Malware Config

Extracted

Family

spynote

C2

en-organisations.gl.at.ply.gg:56409

Targets

    • Target

      ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a.bin

    • Size

      760KB

    • MD5

      6e4a08d8ed87d579e7324ff5b3efdbd3

    • SHA1

      cdd318b379bb2d76c86d92535ea3bc48b4161eb8

    • SHA256

      ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a

    • SHA512

      1d754567914ba39b7280d68fa55dfc94cfdd41fd9d65eb46a9c9115c17d831bdd2a377c8528ab18dcb3bca7b943b069411216d50ce5e2d2919f402ee57d9be49

    • SSDEEP

      12288:6rBz2mfJ6sgRQLzW6wO8par5WmpYshXZPbGwidNpglM:6FztJ6sjLzWe8par5WmD9idNpp

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks