General

  • Target

    0275c798cabe8c5ab973975e6f306410c70430fcab5875d1c0723946fed030c6.bin

  • Size

    770KB

  • Sample

    250107-1xsm9aspap

  • MD5

    678970a7464ed172e78114b7ff1f1a22

  • SHA1

    e05a16db022433081a1dfb6e9b88fa258d64c78a

  • SHA256

    0275c798cabe8c5ab973975e6f306410c70430fcab5875d1c0723946fed030c6

  • SHA512

    ecdd70dcd375a04fba73ef325b0723a034603305f8943f2d421066d28abb3b41392db706c0108c414099e64dd75a0f1b84aa2ba49ef0d33ec48ab1f5f35c74f5

  • SSDEEP

    12288:3UCBdqJ6sgRwLzTEN+YIzLgZZ0s5WmpYshXZPbGwidNpgY3:3UCqJ6sbLzCFSLgZZ0s5WmD9idNpp

Malware Config

Extracted

Family

spynote

C2

ahmedadksahak-43907.portmap.io:43907

Targets

    • Target

      0275c798cabe8c5ab973975e6f306410c70430fcab5875d1c0723946fed030c6.bin

    • Size

      770KB

    • MD5

      678970a7464ed172e78114b7ff1f1a22

    • SHA1

      e05a16db022433081a1dfb6e9b88fa258d64c78a

    • SHA256

      0275c798cabe8c5ab973975e6f306410c70430fcab5875d1c0723946fed030c6

    • SHA512

      ecdd70dcd375a04fba73ef325b0723a034603305f8943f2d421066d28abb3b41392db706c0108c414099e64dd75a0f1b84aa2ba49ef0d33ec48ab1f5f35c74f5

    • SSDEEP

      12288:3UCBdqJ6sgRwLzTEN+YIzLgZZ0s5WmpYshXZPbGwidNpgY3:3UCqJ6sbLzCFSLgZZ0s5WmD9idNpp

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks