General

  • Target

    9fb50869e010a79a734fcff63133fc674fc76ac54312836f3fc079d6acb23188.bin

  • Size

    866KB

  • Sample

    250107-11axls1kbz

  • MD5

    71db10ecd9852ed2343b6872ab40d4af

  • SHA1

    8571883f4aef54bd1d7dfbc24d7fb7f8640f3493

  • SHA256

    9fb50869e010a79a734fcff63133fc674fc76ac54312836f3fc079d6acb23188

  • SHA512

    e053d3ac48fe36759ea31fc307640072b40659e2329a940dd44a8c7494f32ab881ce81c0840b961c24edb1f140747042c47178c5997bf36726e49787cd174d1c

  • SSDEEP

    12288:3E7uPa1a8LzecS62j/SAc5C0Zu02W9xCn5WmpYshXZPbGwidNpgsA:guPa1ame7PjqF5CN0F9xCn5WmD9idNpa

Malware Config

Extracted

Family

spynote

C2

break-lounge.gl.at.ply.gg:47852

Targets

    • Target

      9fb50869e010a79a734fcff63133fc674fc76ac54312836f3fc079d6acb23188.bin

    • Size

      866KB

    • MD5

      71db10ecd9852ed2343b6872ab40d4af

    • SHA1

      8571883f4aef54bd1d7dfbc24d7fb7f8640f3493

    • SHA256

      9fb50869e010a79a734fcff63133fc674fc76ac54312836f3fc079d6acb23188

    • SHA512

      e053d3ac48fe36759ea31fc307640072b40659e2329a940dd44a8c7494f32ab881ce81c0840b961c24edb1f140747042c47178c5997bf36726e49787cd174d1c

    • SSDEEP

      12288:3E7uPa1a8LzecS62j/SAc5C0Zu02W9xCn5WmpYshXZPbGwidNpgsA:guPa1ame7PjqF5CN0F9xCn5WmD9idNpa

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks