General

  • Target

    b7cc519482aed7e42260b284776225970f1f19f0874816176d579caa198db2d4.bin

  • Size

    782KB

  • Sample

    250126-1zc1kswlav

  • MD5

    d08622fb890543a1a32abcda51d77a8f

  • SHA1

    813c2ab072ecf3c1f1d87e6ba0360fbc03d70d76

  • SHA256

    b7cc519482aed7e42260b284776225970f1f19f0874816176d579caa198db2d4

  • SHA512

    5ebe010b1a4ec35be9c94ca8a575acc22599f044ac8b7073eb4be37d4ebbcc48da08b62abd1266a5842424fd2caa62ca76592bcd7e10a91077cb3726d8add194

  • SSDEEP

    12288:KORZn7a1a8LzeVBgDd68zT3U1e95WmpYshXZPbGwidNpgph3y/U:zv7a1amew5RT3Us95WmD9idNpWn

Malware Config

Extracted

Family

spynote

C2

25.ip.gl.ply.gg:29890

Targets

    • Target

      b7cc519482aed7e42260b284776225970f1f19f0874816176d579caa198db2d4.bin

    • Size

      782KB

    • MD5

      d08622fb890543a1a32abcda51d77a8f

    • SHA1

      813c2ab072ecf3c1f1d87e6ba0360fbc03d70d76

    • SHA256

      b7cc519482aed7e42260b284776225970f1f19f0874816176d579caa198db2d4

    • SHA512

      5ebe010b1a4ec35be9c94ca8a575acc22599f044ac8b7073eb4be37d4ebbcc48da08b62abd1266a5842424fd2caa62ca76592bcd7e10a91077cb3726d8add194

    • SSDEEP

      12288:KORZn7a1a8LzeVBgDd68zT3U1e95WmpYshXZPbGwidNpgph3y/U:zv7a1amew5RT3Us95WmD9idNpWn

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks