General

  • Target

    f1f75c34637197c8aa4fc96e0d7ebb8203989234cb1bc41ea78afa63f1942faf.bin

  • Size

    794KB

  • Sample

    250123-1wnynsvpay

  • MD5

    2ba547f1fca82bc37e8f721a404728ba

  • SHA1

    4e9cd845b5e84e317e4dfffcec930922a8d6e743

  • SHA256

    f1f75c34637197c8aa4fc96e0d7ebb8203989234cb1bc41ea78afa63f1942faf

  • SHA512

    965cf459d86d3f048177a50ea06a2ab2bf964d039f65991e801b03df55b64bb9c6a41b3a6b15f4df6e42e30b6c154feca5d3a5ef7d0af7526471839ccf5a7966

  • SSDEEP

    12288:uisJ6sgR8Lz7xG6O0j6j5WmpYshXZPbGwidNpgqh:u3J6s1Lz7E6nj6j5WmD9idNpV

Malware Config

Extracted

Family

spynote

C2

housing-balanced.gl.at.ply.gg:24359

Targets

    • Target

      f1f75c34637197c8aa4fc96e0d7ebb8203989234cb1bc41ea78afa63f1942faf.bin

    • Size

      794KB

    • MD5

      2ba547f1fca82bc37e8f721a404728ba

    • SHA1

      4e9cd845b5e84e317e4dfffcec930922a8d6e743

    • SHA256

      f1f75c34637197c8aa4fc96e0d7ebb8203989234cb1bc41ea78afa63f1942faf

    • SHA512

      965cf459d86d3f048177a50ea06a2ab2bf964d039f65991e801b03df55b64bb9c6a41b3a6b15f4df6e42e30b6c154feca5d3a5ef7d0af7526471839ccf5a7966

    • SSDEEP

      12288:uisJ6sgR8Lz7xG6O0j6j5WmpYshXZPbGwidNpgqh:u3J6s1Lz7E6nj6j5WmD9idNpV

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks