General

  • Target

    e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759.bin

  • Size

    783KB

  • Sample

    250206-1xfcxszral

  • MD5

    2958f55b4ffc21dbfd8d19b8cd538175

  • SHA1

    4b073f9d31a2a56839feb3bb364215e04a81dda5

  • SHA256

    e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759

  • SHA512

    d952f0ea3ce0d3ad32489f857b4bc8ec8aa5306395d1628cf85facc4786c7c4f90bd38b853257071f991a80c65dde64936595a5ca6f9268d572ed7c91de47efb

  • SSDEEP

    12288:6Za1a8Lze+ITqPWE75WmpYshXZPbGwidNpgnM:+a1ame+RPWE75WmD9idNpn

Malware Config

Extracted

Family

spynote

C2

sep-reseller.gl.at.ply.gg:51936

Targets

    • Target

      e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759.bin

    • Size

      783KB

    • MD5

      2958f55b4ffc21dbfd8d19b8cd538175

    • SHA1

      4b073f9d31a2a56839feb3bb364215e04a81dda5

    • SHA256

      e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759

    • SHA512

      d952f0ea3ce0d3ad32489f857b4bc8ec8aa5306395d1628cf85facc4786c7c4f90bd38b853257071f991a80c65dde64936595a5ca6f9268d572ed7c91de47efb

    • SSDEEP

      12288:6Za1a8Lze+ITqPWE75WmpYshXZPbGwidNpgnM:+a1ame+RPWE75WmD9idNpn

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks