General

  • Target

    71aaafb8ccfd08fe3d942bf6ba7812f342600d7641783d2d4080ae9e55aea104.bin

  • Size

    760KB

  • Sample

    250117-1xjeksvncj

  • MD5

    19e5e4992de5a3346d6f13571fa5075c

  • SHA1

    766010b485c62b07a921f66a4e5ec142d947b7e0

  • SHA256

    71aaafb8ccfd08fe3d942bf6ba7812f342600d7641783d2d4080ae9e55aea104

  • SHA512

    697ee8fb97e1fcd5dacaafd47404217c6542b65507bad248d575d500cfa9a53387c9ed071cf7abc361ef2913c4ca7aea510ddb209feff2e480531d77e869a6e4

  • SSDEEP

    12288:UpONlEa1a8LreSWLGx2SU5WmpYshXZPbGwidNpgoS:Ukka1a2eSDx2SU5WmD9idNps

Malware Config

Extracted

Family

spynote

C2

192.168.1.45:9595

Targets

    • Target

      71aaafb8ccfd08fe3d942bf6ba7812f342600d7641783d2d4080ae9e55aea104.bin

    • Size

      760KB

    • MD5

      19e5e4992de5a3346d6f13571fa5075c

    • SHA1

      766010b485c62b07a921f66a4e5ec142d947b7e0

    • SHA256

      71aaafb8ccfd08fe3d942bf6ba7812f342600d7641783d2d4080ae9e55aea104

    • SHA512

      697ee8fb97e1fcd5dacaafd47404217c6542b65507bad248d575d500cfa9a53387c9ed071cf7abc361ef2913c4ca7aea510ddb209feff2e480531d77e869a6e4

    • SSDEEP

      12288:UpONlEa1a8LreSWLGx2SU5WmpYshXZPbGwidNpgoS:Ukka1a2eSDx2SU5WmD9idNps

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks