General

  • Target

    3a4604abbb0479979c8d262cc93937c3c6f39f8e90578ea74378bae9cdc4992d.bin

  • Size

    760KB

  • Sample

    250103-1x3hfsykdr

  • MD5

    168e0adc84fc845cf2ea12cd40bba095

  • SHA1

    2d4f80b44fc8791e4ef3cf8a14ea9fdd42916bfe

  • SHA256

    3a4604abbb0479979c8d262cc93937c3c6f39f8e90578ea74378bae9cdc4992d

  • SHA512

    c09366a4c2626d2876ff63ebd9906e42e7bf5823b56b79fb13df3a5c483315edbb48c927ac44829066180a652aa777866c3afa67b0ace395aec44c835d0cf896

  • SSDEEP

    12288:xRN606Aja1a8LdeKt0sSy3z5WmpYshXZPbGwidNpgVd+:xL68a1a6eKbSy3z5WmD9idNpR

Malware Config

Extracted

Family

spynote

C2

0.tcp.ngrok.io:14051

Targets

    • Target

      3a4604abbb0479979c8d262cc93937c3c6f39f8e90578ea74378bae9cdc4992d.bin

    • Size

      760KB

    • MD5

      168e0adc84fc845cf2ea12cd40bba095

    • SHA1

      2d4f80b44fc8791e4ef3cf8a14ea9fdd42916bfe

    • SHA256

      3a4604abbb0479979c8d262cc93937c3c6f39f8e90578ea74378bae9cdc4992d

    • SHA512

      c09366a4c2626d2876ff63ebd9906e42e7bf5823b56b79fb13df3a5c483315edbb48c927ac44829066180a652aa777866c3afa67b0ace395aec44c835d0cf896

    • SSDEEP

      12288:xRN606Aja1a8LdeKt0sSy3z5WmpYshXZPbGwidNpgVd+:xL68a1a6eKbSy3z5WmD9idNpR

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks