General

  • Target

    d37b33e46bc19ef16edcbc52f8d9f01288d3dc6cb12c80f768ff59765d81a6c5.bin

  • Size

    767KB

  • Sample

    250103-1zakfswjfz

  • MD5

    aee7b9c4e614459a1349cb9bc1c35577

  • SHA1

    8b602bef314f90eba708db7235e3b50e07908015

  • SHA256

    d37b33e46bc19ef16edcbc52f8d9f01288d3dc6cb12c80f768ff59765d81a6c5

  • SHA512

    03011d04d59229668d8f62f5c9d7825686fa66be0d8b2a013faf8dc9c981d73960ff3b0c5f0de7721e44c3db29d9017d2d380527a84f6093d200d21fa81bafcf

  • SSDEEP

    12288:avzn8mi/a1a8LrejwBqQjz5WmpYshXZPbGwidNpgMz:+z8Za1a2ejYqQjz5WmD9idNp5

Malware Config

Extracted

Family

spynote

C2

147.185.221.24:47739

Targets

    • Target

      d37b33e46bc19ef16edcbc52f8d9f01288d3dc6cb12c80f768ff59765d81a6c5.bin

    • Size

      767KB

    • MD5

      aee7b9c4e614459a1349cb9bc1c35577

    • SHA1

      8b602bef314f90eba708db7235e3b50e07908015

    • SHA256

      d37b33e46bc19ef16edcbc52f8d9f01288d3dc6cb12c80f768ff59765d81a6c5

    • SHA512

      03011d04d59229668d8f62f5c9d7825686fa66be0d8b2a013faf8dc9c981d73960ff3b0c5f0de7721e44c3db29d9017d2d380527a84f6093d200d21fa81bafcf

    • SSDEEP

      12288:avzn8mi/a1a8LrejwBqQjz5WmpYshXZPbGwidNpgMz:+z8Za1a2ejYqQjz5WmD9idNp5

    • Removes its main activity from the application launcher

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks