General

  • Target

    409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3.bin

  • Size

    760KB

  • Sample

    250121-11aa3stngl

  • MD5

    3e25d7cb7fb34648c825213f630962aa

  • SHA1

    3aed04fa87764cf84f5704cd52e1d9ec659722b1

  • SHA256

    409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3

  • SHA512

    3315574e6dc5432cc998b063ddee1318d546687c56cb1f3f57184b085f9f221332ecd57219dc8f71f2ed92aa1e0a98b3636f22661cdf421fcaeca1341abb55ab

  • SSDEEP

    12288:nvM+LHPa1a8LreD8fkaAXx5WmpYshXZPbGwidNpgZh:nvMka1a2eDDaAXx5WmD9idNp0

Malware Config

Extracted

Family

spynote

C2

192.168.0.104:9595

Targets

    • Target

      409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3.bin

    • Size

      760KB

    • MD5

      3e25d7cb7fb34648c825213f630962aa

    • SHA1

      3aed04fa87764cf84f5704cd52e1d9ec659722b1

    • SHA256

      409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3

    • SHA512

      3315574e6dc5432cc998b063ddee1318d546687c56cb1f3f57184b085f9f221332ecd57219dc8f71f2ed92aa1e0a98b3636f22661cdf421fcaeca1341abb55ab

    • SSDEEP

      12288:nvM+LHPa1a8LreD8fkaAXx5WmpYshXZPbGwidNpgZh:nvMka1a2eDDaAXx5WmD9idNp0

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks