General

  • Target

    7e0c7db9cf3b24d903d578a56b45dd6dc79b0934e0ff31e8bf72737c4bc1b57f.bin

  • Size

    760KB

  • Sample

    250120-1zl89a1qew

  • MD5

    21c494f54a397799d930d06d9fa2e53a

  • SHA1

    38d9c40e0953cf5b15c452e028c839276f1f04f3

  • SHA256

    7e0c7db9cf3b24d903d578a56b45dd6dc79b0934e0ff31e8bf72737c4bc1b57f

  • SHA512

    989cf8f05a23dfe263bdf00474fe772d5f5b88b699478db40cb8ccc6a93f8e059ee72d85308f0cae8f359ec7f5cc28302e10fad1552b522c57c270fd7c4c028b

  • SSDEEP

    12288:rZcS+7a1a8Ldel5ZmToDMq5WmpYshXZPbGwidNpgcuT:+a1a6elSTIMq5WmD9idNp4

Malware Config

Extracted

Family

spynote

C2

song-cleared.gl.at.ply.gg:36390

Targets

    • Target

      7e0c7db9cf3b24d903d578a56b45dd6dc79b0934e0ff31e8bf72737c4bc1b57f.bin

    • Size

      760KB

    • MD5

      21c494f54a397799d930d06d9fa2e53a

    • SHA1

      38d9c40e0953cf5b15c452e028c839276f1f04f3

    • SHA256

      7e0c7db9cf3b24d903d578a56b45dd6dc79b0934e0ff31e8bf72737c4bc1b57f

    • SHA512

      989cf8f05a23dfe263bdf00474fe772d5f5b88b699478db40cb8ccc6a93f8e059ee72d85308f0cae8f359ec7f5cc28302e10fad1552b522c57c270fd7c4c028b

    • SSDEEP

      12288:rZcS+7a1a8Ldel5ZmToDMq5WmpYshXZPbGwidNpgcuT:+a1a6elSTIMq5WmD9idNp4

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks