General

  • Target

    132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66.bin

  • Size

    748KB

  • Sample

    250107-13jyas1lcs

  • MD5

    2f75ed762fb1de331837db74a911c5f0

  • SHA1

    a3d4cdadb8f373f0921a92571851f3546ec0fc60

  • SHA256

    132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66

  • SHA512

    82486a27a055e1020b57ca0c946d9f12960b307d7143d1eaaa3ff59607467b903d3db015fa05e0a4a542275d8579bae1c579119fad97536223bc529ee7d30cb3

  • SSDEEP

    12288:bvpKZb+VDa1a8LVeC42S3/DpgB5WmpYshXZPbGwidNpgT5:j8ZcDa1aKeC4t3NgB5WmD9idNp+

Malware Config

Extracted

Family

spynote

C2

192.168.0.110:4141

Targets

    • Target

      132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66.bin

    • Size

      748KB

    • MD5

      2f75ed762fb1de331837db74a911c5f0

    • SHA1

      a3d4cdadb8f373f0921a92571851f3546ec0fc60

    • SHA256

      132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66

    • SHA512

      82486a27a055e1020b57ca0c946d9f12960b307d7143d1eaaa3ff59607467b903d3db015fa05e0a4a542275d8579bae1c579119fad97536223bc529ee7d30cb3

    • SSDEEP

      12288:bvpKZb+VDa1a8LVeC42S3/DpgB5WmpYshXZPbGwidNpgT5:j8ZcDa1aKeC4t3NgB5WmD9idNp+

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks