General

  • Target

    87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9.bin

  • Size

    4.6MB

  • Sample

    250209-1w8m3svmaw

  • MD5

    fce76148e56cb8fe5c7e6909d9536e99

  • SHA1

    00e19b74fb75abc79e7772a4adbcab5c342a58c3

  • SHA256

    87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9

  • SHA512

    755322b5130af78d658a7005508b70ae0b63cae035e9752508924c7c1b65a366525df77b9d4ed31b6261f4790ea1238c519b42bb240cd1c05b303aafdd046a57

  • SSDEEP

    98304:+U+WRcSSw8gUC9tN3rM9SpV+i8wjdwb8LvX5J7pHr0CbGBw:YSS9CDxrM9Spvdw4L/pHr0r+

Malware Config

Targets

    • Target

      87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9.bin

    • Size

      4.6MB

    • MD5

      fce76148e56cb8fe5c7e6909d9536e99

    • SHA1

      00e19b74fb75abc79e7772a4adbcab5c342a58c3

    • SHA256

      87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9

    • SHA512

      755322b5130af78d658a7005508b70ae0b63cae035e9752508924c7c1b65a366525df77b9d4ed31b6261f4790ea1238c519b42bb240cd1c05b303aafdd046a57

    • SSDEEP

      98304:+U+WRcSSw8gUC9tN3rM9SpV+i8wjdwb8LvX5J7pHr0CbGBw:YSS9CDxrM9Spvdw4L/pHr0r+

    • Spynote

      Spynote is a Remote Access Trojan first seen in 2017.

    • Spynote family

    • Spynote payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks