General

  • Target

    7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42.bin

  • Size

    742KB

  • Sample

    250130-1yqv2swlgr

  • MD5

    674cde64f57ab0536cacdf0bffb28792

  • SHA1

    c0b3c25cd57fa52529168502b6e30e2d79c594ca

  • SHA256

    7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42

  • SHA512

    6c236b9094d46eedc7251fc2b5ffa231248982524057f1b100bcc1cff5ed221f80d73941508bdf9f948a5489ad5adcd8ec3404abe2680e990b4b3f2db87f0d8d

  • SSDEEP

    12288:kvJ6sgRALznP7WOOKP5WmpYshXZPbGwidNpg/2:EJ6sjLznKOOKP5WmD9idNpp

Malware Config

Extracted

Family

spynote

C2

24.ip.gl.ply.gg:27203

Targets

    • Target

      7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42.bin

    • Size

      742KB

    • MD5

      674cde64f57ab0536cacdf0bffb28792

    • SHA1

      c0b3c25cd57fa52529168502b6e30e2d79c594ca

    • SHA256

      7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42

    • SHA512

      6c236b9094d46eedc7251fc2b5ffa231248982524057f1b100bcc1cff5ed221f80d73941508bdf9f948a5489ad5adcd8ec3404abe2680e990b4b3f2db87f0d8d

    • SSDEEP

      12288:kvJ6sgRALznP7WOOKP5WmpYshXZPbGwidNpg/2:EJ6sjLznKOOKP5WmD9idNpp

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks