General

  • Target

    6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de.bin

  • Size

    760KB

  • Sample

    250107-12jada1kgy

  • MD5

    8d821ffc8a3872c81cb140a31c706395

  • SHA1

    d6de3912b0cfc158bb40d277a133d2e570bb8ae1

  • SHA256

    6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de

  • SHA512

    9e405671ba8a7f8b5a0b77117511cb14e72a413ad9e27f09e27d5dfdeb030198db6f86ca7a268a3a0e63b9e88fe75babe1de2c0308c673cadeac3ace6c9f2696

  • SSDEEP

    12288:b/CVzcBZRvS0qZB1i/gYu5WmpYshXZPbGwidNpg/k:bqGBZRrqZK/gYu5WmD9idNpr

Malware Config

Extracted

Family

spynote

C2

ad-forestry.gl.at.ply.gg:51714

Targets

    • Target

      6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de.bin

    • Size

      760KB

    • MD5

      8d821ffc8a3872c81cb140a31c706395

    • SHA1

      d6de3912b0cfc158bb40d277a133d2e570bb8ae1

    • SHA256

      6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de

    • SHA512

      9e405671ba8a7f8b5a0b77117511cb14e72a413ad9e27f09e27d5dfdeb030198db6f86ca7a268a3a0e63b9e88fe75babe1de2c0308c673cadeac3ace6c9f2696

    • SSDEEP

      12288:b/CVzcBZRvS0qZB1i/gYu5WmpYshXZPbGwidNpg/k:bqGBZRrqZK/gYu5WmD9idNpr

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks