General

  • Target

    7b3ece4ed7733b9bc175d13556019cbdc30f3e679cf461f3bc6dfe7bbd6b781c.bin

  • Size

    760KB

  • Sample

    250102-1yg8xazqeq

  • MD5

    919fb80b8915c1c4f1c0d2260b838116

  • SHA1

    4d7c0b339a2581735869c7255c8b04c31724ac28

  • SHA256

    7b3ece4ed7733b9bc175d13556019cbdc30f3e679cf461f3bc6dfe7bbd6b781c

  • SHA512

    9bc111bfe7b6787150bf4570f68ea629649988c5cd04a1acb9b0d627ffe7dd74da239cb6abcb13e89adb58ade094ca91901348a0340f9e59753f1b189b80ec2b

  • SSDEEP

    12288:6wKQgHa1a8Lrec7WvqjDL5WmpYshXZPbGwidNpgfo:6wua1a2ecAqjDL5WmD9idNp7

Malware Config

Extracted

Family

spynote

C2

homes-planets.gl.at.ply.gg:57402

Targets

    • Target

      7b3ece4ed7733b9bc175d13556019cbdc30f3e679cf461f3bc6dfe7bbd6b781c.bin

    • Size

      760KB

    • MD5

      919fb80b8915c1c4f1c0d2260b838116

    • SHA1

      4d7c0b339a2581735869c7255c8b04c31724ac28

    • SHA256

      7b3ece4ed7733b9bc175d13556019cbdc30f3e679cf461f3bc6dfe7bbd6b781c

    • SHA512

      9bc111bfe7b6787150bf4570f68ea629649988c5cd04a1acb9b0d627ffe7dd74da239cb6abcb13e89adb58ade094ca91901348a0340f9e59753f1b189b80ec2b

    • SSDEEP

      12288:6wKQgHa1a8Lrec7WvqjDL5WmpYshXZPbGwidNpgfo:6wua1a2ecAqjDL5WmD9idNp7

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks