General

  • Target

    b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de.bin

  • Size

    1.8MB

  • Sample

    250126-1w7e1sxkbm

  • MD5

    79aec0df863d69f4b2b69c29afa76b37

  • SHA1

    3ad17cc16fb53af42393ea21c5a90f2254767e9d

  • SHA256

    b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de

  • SHA512

    c0bf31d15c62e2b90a73afc08f8f6b44411e9060b665690353f6b47a1751b5b31e53d4f2f8106c25c0456fb89d4fc7f711f267abc3e3738eec569cc012f66b19

  • SSDEEP

    49152:G/JJZ1TWFzJznMj9zb3fxKvqF2lL/KIr40tgJPR:G/JJHq/TMxrfxKFlL/cv

Malware Config

Extracted

Family

spynote

C2

a-protecting.gl.at.ply.gg:33977

Targets

    • Target

      b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de.bin

    • Size

      1.8MB

    • MD5

      79aec0df863d69f4b2b69c29afa76b37

    • SHA1

      3ad17cc16fb53af42393ea21c5a90f2254767e9d

    • SHA256

      b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de

    • SHA512

      c0bf31d15c62e2b90a73afc08f8f6b44411e9060b665690353f6b47a1751b5b31e53d4f2f8106c25c0456fb89d4fc7f711f267abc3e3738eec569cc012f66b19

    • SSDEEP

      49152:G/JJZ1TWFzJznMj9zb3fxKvqF2lL/KIr40tgJPR:G/JJHq/TMxrfxKFlL/cv

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks