General

  • Target

    04f4665e81ff2a935f2f8e155e61d0e3486f2e17b7d4924dffcf083e11365a7d.bin

  • Size

    759KB

  • Sample

    250110-1xd5vsskcp

  • MD5

    7322c5ee30f9e14261320f0aec2f358a

  • SHA1

    1129508d04a4253fb3279038bfae55716a8590b3

  • SHA256

    04f4665e81ff2a935f2f8e155e61d0e3486f2e17b7d4924dffcf083e11365a7d

  • SHA512

    20d5da24e5da6acebd55f81b57c2b38a239ff6270e30ddfa84a1657e179e3a40c6e5f980e43fba6eb6c0a4242ca79f027db72f35b9315c6ae54f29d4f6814f46

  • SSDEEP

    12288:BFO4zXMa1a8LdeQ9XwtDjeU5WmpYshXZPbGwidNpgF0:B45a1a6eQ9AtDjeU5WmD9idNpR

Malware Config

Extracted

Family

spynote

C2

xu4ok-46126.portmap.host:46126

Targets

    • Target

      04f4665e81ff2a935f2f8e155e61d0e3486f2e17b7d4924dffcf083e11365a7d.bin

    • Size

      759KB

    • MD5

      7322c5ee30f9e14261320f0aec2f358a

    • SHA1

      1129508d04a4253fb3279038bfae55716a8590b3

    • SHA256

      04f4665e81ff2a935f2f8e155e61d0e3486f2e17b7d4924dffcf083e11365a7d

    • SHA512

      20d5da24e5da6acebd55f81b57c2b38a239ff6270e30ddfa84a1657e179e3a40c6e5f980e43fba6eb6c0a4242ca79f027db72f35b9315c6ae54f29d4f6814f46

    • SSDEEP

      12288:BFO4zXMa1a8LdeQ9XwtDjeU5WmpYshXZPbGwidNpgF0:B45a1a6eQ9AtDjeU5WmD9idNpR

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks