General

  • Target

    3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3.bin

  • Size

    760KB

  • Sample

    250103-1y8qvswjfw

  • MD5

    5e5a605b500ad8c90aa420bd6180234b

  • SHA1

    6abf33b0e2232ad570d217485932b80e31d22b12

  • SHA256

    3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3

  • SHA512

    03273dcaa001fbd99e75a2f46187e26bd22c0ef04d596089ef14d827d783cc44381d7356498e8164a996f89e8ccafffeb09a1c1acd606dcf54336d687e488cd5

  • SSDEEP

    12288:lc2H6ba1a8LzekLaFWHH75WmpYshXZPbGwidNpgXCY:l8ba1amekuWHH75WmD9idNpgD

Malware Config

Extracted

Family

spynote

C2

web-track.gl.at.ply.gg:58083

Targets

    • Target

      3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3.bin

    • Size

      760KB

    • MD5

      5e5a605b500ad8c90aa420bd6180234b

    • SHA1

      6abf33b0e2232ad570d217485932b80e31d22b12

    • SHA256

      3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3

    • SHA512

      03273dcaa001fbd99e75a2f46187e26bd22c0ef04d596089ef14d827d783cc44381d7356498e8164a996f89e8ccafffeb09a1c1acd606dcf54336d687e488cd5

    • SSDEEP

      12288:lc2H6ba1a8LzekLaFWHH75WmpYshXZPbGwidNpgXCY:l8ba1amekuWHH75WmD9idNpgD

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks