General

  • Target

    60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f.bin

  • Size

    760KB

  • Sample

    250102-1xxbfazqcp

  • MD5

    bf6ae37cf1bff093b046538cf460c11c

  • SHA1

    137772df2176640b20f7ca6352336cb01c3b02a5

  • SHA256

    60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f

  • SHA512

    edf5d9ed01bf1729be042265ea8f73818d06ab73b81002af5cc4d8d9ef173586d05c240ddec74cc8cd62e20cf6bb8f66bf74386c63bf44e1e8ad2cc227333a2b

  • SSDEEP

    12288:F8TNL7a1a8LdemLRN7u6Ah5WmpYshXZPbGwidNpgghX:FOL7a1a6emD7u6Ah5WmD9idNpLX

Malware Config

Extracted

Family

spynote

C2

ad-forestry.gl.at.ply.gg:51714

Targets

    • Target

      60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f.bin

    • Size

      760KB

    • MD5

      bf6ae37cf1bff093b046538cf460c11c

    • SHA1

      137772df2176640b20f7ca6352336cb01c3b02a5

    • SHA256

      60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f

    • SHA512

      edf5d9ed01bf1729be042265ea8f73818d06ab73b81002af5cc4d8d9ef173586d05c240ddec74cc8cd62e20cf6bb8f66bf74386c63bf44e1e8ad2cc227333a2b

    • SSDEEP

      12288:F8TNL7a1a8LdemLRN7u6Ah5WmpYshXZPbGwidNpgghX:FOL7a1a6emD7u6Ah5WmD9idNpLX

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks