General

  • Target

    2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96.bin

  • Size

    760KB

  • Sample

    250121-1zngbatjbt

  • MD5

    3bdd384b39d0bdf6388f6f9c9ada28d6

  • SHA1

    1b331a7874f9ffb5c9380dfeead79530f1049f8d

  • SHA256

    2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96

  • SHA512

    10348bacea8b34681db63193e254ff69f125336e0614722cd3fc357ff5f577811bc489729d82abffa13c9a2940dd70d7b85e350cfa3a03410735ea2dd721b3f3

  • SSDEEP

    12288:5PLa1a8Lde1hto3TYw/5WmpYshXZPbGwidNpgBqf:ha1a6e1w3TY25WmD9idNpv

Malware Config

Extracted

Family

spynote

C2

important-focal.gl.at.ply.gg:24318

Targets

    • Target

      2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96.bin

    • Size

      760KB

    • MD5

      3bdd384b39d0bdf6388f6f9c9ada28d6

    • SHA1

      1b331a7874f9ffb5c9380dfeead79530f1049f8d

    • SHA256

      2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96

    • SHA512

      10348bacea8b34681db63193e254ff69f125336e0614722cd3fc357ff5f577811bc489729d82abffa13c9a2940dd70d7b85e350cfa3a03410735ea2dd721b3f3

    • SSDEEP

      12288:5PLa1a8Lde1hto3TYw/5WmpYshXZPbGwidNpgBqf:ha1a6e1w3TY25WmD9idNpv

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks