General

  • Target

    0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5.bin

  • Size

    772KB

  • Sample

    250119-1zgnrsxrev

  • MD5

    e11f68853bba026c7ca71c7e00b24b8d

  • SHA1

    22b309e1475b92d478e5d7345f2e55d9c1658d3b

  • SHA256

    0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5

  • SHA512

    9b92b6177b06c7bc46715f05cbc507f27b0137297c4dbc0eb7786b863c0517ed18558aa1c449bb965d944681cf8e018eef283f7dec0b183a9d3bda31984e17a3

  • SSDEEP

    12288:kfKRSa1a8LreNOR21eGw5WmpYshXZPbGwidNpgrA:k3a1a2eNv1eGw5WmD9idNpn

Malware Config

Extracted

Family

spynote

C2

7.tcp.eu.ngrok.io:15957

Targets

    • Target

      0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5.bin

    • Size

      772KB

    • MD5

      e11f68853bba026c7ca71c7e00b24b8d

    • SHA1

      22b309e1475b92d478e5d7345f2e55d9c1658d3b

    • SHA256

      0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5

    • SHA512

      9b92b6177b06c7bc46715f05cbc507f27b0137297c4dbc0eb7786b863c0517ed18558aa1c449bb965d944681cf8e018eef283f7dec0b183a9d3bda31984e17a3

    • SSDEEP

      12288:kfKRSa1a8LreNOR21eGw5WmpYshXZPbGwidNpgrA:k3a1a2eNv1eGw5WmD9idNpn

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks