General

  • Target

    05a45bbf335386b4fcdae4f7bf4ee436472dd0d35b8a665b75b2410cf8a41f79.bin

  • Size

    891KB

  • Sample

    250115-1z5qlawqgy

  • MD5

    07891cf7d66dc248af233f28068bded9

  • SHA1

    a15a928d0856517056a8211ee982e782374dde00

  • SHA256

    05a45bbf335386b4fcdae4f7bf4ee436472dd0d35b8a665b75b2410cf8a41f79

  • SHA512

    92faeb8bbd154a2a64217bc01f3cd3121e2960f8473a0d655f26972c052e3cd82c741eea3a39b34f41cadcac954e7fbf62432599f7c9a3e36b903803cd7e2def

  • SSDEEP

    24576:rLfo0KJ6sjLzAv8RWCB86SP5WmD9idNpZ:rLf8J6skvWGFWk0d/Z

Malware Config

Extracted

Family

spynote

C2

ashamazingmia-61382.portmap.host:61382

Targets

    • Target

      05a45bbf335386b4fcdae4f7bf4ee436472dd0d35b8a665b75b2410cf8a41f79.bin

    • Size

      891KB

    • MD5

      07891cf7d66dc248af233f28068bded9

    • SHA1

      a15a928d0856517056a8211ee982e782374dde00

    • SHA256

      05a45bbf335386b4fcdae4f7bf4ee436472dd0d35b8a665b75b2410cf8a41f79

    • SHA512

      92faeb8bbd154a2a64217bc01f3cd3121e2960f8473a0d655f26972c052e3cd82c741eea3a39b34f41cadcac954e7fbf62432599f7c9a3e36b903803cd7e2def

    • SSDEEP

      24576:rLfo0KJ6sjLzAv8RWCB86SP5WmD9idNpZ:rLf8J6skvWGFWk0d/Z

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks