General

  • Target

    9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf.bin

  • Size

    773KB

  • Sample

    250102-1ye4jsxlhz

  • MD5

    b828d7ec8bace54b340487c2aef6582c

  • SHA1

    33c8a051f756de397476a8ff5421d85d59053589

  • SHA256

    9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf

  • SHA512

    76bd048b980075965f38b704a52d9b91a29b49eb6fcc81cb733e0227f8db04c1bc71414785373b110c65b5ee05f1f86b89b184be0c6e447249970d579c56415b

  • SSDEEP

    12288:E0a1a8LrerhPfnLtAd5WmpYshXZPbGwidNpgyu:Fa1a2erlnhAd5WmD9idNp2

Malware Config

Extracted

Family

spynote

C2

5.tcp.eu.ngrok.io:17528

Targets

    • Target

      9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf.bin

    • Size

      773KB

    • MD5

      b828d7ec8bace54b340487c2aef6582c

    • SHA1

      33c8a051f756de397476a8ff5421d85d59053589

    • SHA256

      9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf

    • SHA512

      76bd048b980075965f38b704a52d9b91a29b49eb6fcc81cb733e0227f8db04c1bc71414785373b110c65b5ee05f1f86b89b184be0c6e447249970d579c56415b

    • SSDEEP

      12288:E0a1a8LrerhPfnLtAd5WmpYshXZPbGwidNpgyu:Fa1a2erlnhAd5WmD9idNp2

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks