General

  • Target

    492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36.bin

  • Size

    757KB

  • Sample

    250126-1w9kdawkaw

  • MD5

    0d6eb34cacc613e925c7b22de502eb8c

  • SHA1

    818d31e3407cf36bc9654421dc4c08df9f386c85

  • SHA256

    492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36

  • SHA512

    c3cecb2a6a3ec40f22b18b845093e5685fb0fd3a336f20185cb444df51fab1175ef70dd2c8e427fb73a9e1bd1b8ba3d6e2cd53e34a611220cf815de6602771e7

  • SSDEEP

    12288:wOEG9a1a8LzeQ6ylJDBVDI685WmpYshXZPbGwidNpgLW:NEka1ameqlJNVc685WmD9idNpB

Malware Config

Extracted

Family

spynote

C2

a-protecting.gl.at.ply.gg:33977

Targets

    • Target

      492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36.bin

    • Size

      757KB

    • MD5

      0d6eb34cacc613e925c7b22de502eb8c

    • SHA1

      818d31e3407cf36bc9654421dc4c08df9f386c85

    • SHA256

      492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36

    • SHA512

      c3cecb2a6a3ec40f22b18b845093e5685fb0fd3a336f20185cb444df51fab1175ef70dd2c8e427fb73a9e1bd1b8ba3d6e2cd53e34a611220cf815de6602771e7

    • SSDEEP

      12288:wOEG9a1a8LzeQ6ylJDBVDI685WmpYshXZPbGwidNpgLW:NEka1ameqlJNVc685WmD9idNpB

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks