General

  • Target

    e96a530a1e0520cc38871aa7d58c785ed6ad71ce8132757da786bccf464461b0.bin

  • Size

    760KB

  • Sample

    250205-1y2mjswkcp

  • MD5

    9ff7144f8b76e7e3908ccf25882f0ce9

  • SHA1

    ae45db48af54d5e0c665026f079b4bd80b23cd6f

  • SHA256

    e96a530a1e0520cc38871aa7d58c785ed6ad71ce8132757da786bccf464461b0

  • SHA512

    37f0e480caea4ca9203b6423c02ce1ff9d3a5591e2d30e71bf79c44a22f30055a368ae35e38bc76e3566cb104640531510aa06f4e504caa9b32662a2f230ea99

  • SSDEEP

    12288:yoOVbtcYBNa1a8LzektiAscRB5WmpYshXZPbGwidNpgKG:ylBtHNa1amekVscRB5WmD9idNp+

Malware Config

Extracted

Family

spynote

C2

AKASHamb-48302.portmap.host:48302

Targets

    • Target

      e96a530a1e0520cc38871aa7d58c785ed6ad71ce8132757da786bccf464461b0.bin

    • Size

      760KB

    • MD5

      9ff7144f8b76e7e3908ccf25882f0ce9

    • SHA1

      ae45db48af54d5e0c665026f079b4bd80b23cd6f

    • SHA256

      e96a530a1e0520cc38871aa7d58c785ed6ad71ce8132757da786bccf464461b0

    • SHA512

      37f0e480caea4ca9203b6423c02ce1ff9d3a5591e2d30e71bf79c44a22f30055a368ae35e38bc76e3566cb104640531510aa06f4e504caa9b32662a2f230ea99

    • SSDEEP

      12288:yoOVbtcYBNa1a8LzektiAscRB5WmpYshXZPbGwidNpgKG:ylBtHNa1amekVscRB5WmD9idNp+

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks