General

  • Target

    069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3.bin

  • Size

    747KB

  • Sample

    250101-1wnb5swqcs

  • MD5

    318093394469728fff0967b83b37e03a

  • SHA1

    0b0630173f68ae7d89a8191930b08a9f334a4063

  • SHA256

    069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3

  • SHA512

    51292cc24d753df483d68b6c08b57e81f7ca9cfeac1a7cd1635758404ebd411aaee85e7ff825a18abd4f6ed2d116767b87f9d9117667169011450639c115f599

  • SSDEEP

    12288:AMa1a8LrezET3vIU5WmpYshXZPbGwidNpgkF:Fa1a2ezi3vIU5WmD9idNpn

Malware Config

Extracted

Family

spynote

C2

casino-connector.gl.at.ply.gg:56722

Targets

    • Target

      069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3.bin

    • Size

      747KB

    • MD5

      318093394469728fff0967b83b37e03a

    • SHA1

      0b0630173f68ae7d89a8191930b08a9f334a4063

    • SHA256

      069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3

    • SHA512

      51292cc24d753df483d68b6c08b57e81f7ca9cfeac1a7cd1635758404ebd411aaee85e7ff825a18abd4f6ed2d116767b87f9d9117667169011450639c115f599

    • SSDEEP

      12288:AMa1a8LrezET3vIU5WmpYshXZPbGwidNpgkF:Fa1a2ezi3vIU5WmD9idNpn

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks