General

  • Target

    aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702.bin

  • Size

    748KB

  • Sample

    250110-1w6tgszkbz

  • MD5

    647b28e5b50870c13ca0b4076fcbab9d

  • SHA1

    9ce6259ae8a73c91160a07579daac8f932aa4be7

  • SHA256

    aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702

  • SHA512

    d7532fd2cd8a091728e69b820875b009abaa08c9103a5c856a72e3d2d9b2dfa24a8bf9f39e9a48dce376ce784bb5dec1f23daadaa0b3423d14551a96e8d93160

  • SSDEEP

    12288:GRhcwJ6sgRnLz4DqeUXtv5WmpYshXZPbGwidNpgLX:ChPJ6scLzI5UXtv5WmD9idNpk

Malware Config

Extracted

Family

spynote

C2

25.ip.gl.ply.gg:6614

Targets

    • Target

      aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702.bin

    • Size

      748KB

    • MD5

      647b28e5b50870c13ca0b4076fcbab9d

    • SHA1

      9ce6259ae8a73c91160a07579daac8f932aa4be7

    • SHA256

      aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702

    • SHA512

      d7532fd2cd8a091728e69b820875b009abaa08c9103a5c856a72e3d2d9b2dfa24a8bf9f39e9a48dce376ce784bb5dec1f23daadaa0b3423d14551a96e8d93160

    • SSDEEP

      12288:GRhcwJ6sgRnLz4DqeUXtv5WmpYshXZPbGwidNpgLX:ChPJ6scLzI5UXtv5WmD9idNpk

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks