General

  • Target

    4928bb45a0e23f3b7299691aeebea28deb42ffb441a3bda3b405f347eb48f6a4.bin

  • Size

    753KB

  • Sample

    250209-1x2adsvmdx

  • MD5

    15d4a1e3279eb0fb04c7adf6b29e0592

  • SHA1

    21ba93d34b09b1cd9591425dc49f6369e229ff0d

  • SHA256

    4928bb45a0e23f3b7299691aeebea28deb42ffb441a3bda3b405f347eb48f6a4

  • SHA512

    17ea5aa87b2ef01fc69f12fa53625a2d86174f41bcb1471f8cf9953c82a4b40ebfdd2aba8192fea168c784455abf3f60945c61a0bec7765d4e72a3fcc239a377

  • SSDEEP

    12288:GUYAa1a8LdeVrSSe+lP15WmpYshXZPbGwidNpgux:GUxa1a6eV+SeSP15WmD9idNpZ

Malware Config

Extracted

Family

spynote

C2

time-patient.gl.at.ply.gg:25309

Targets

    • Target

      4928bb45a0e23f3b7299691aeebea28deb42ffb441a3bda3b405f347eb48f6a4.bin

    • Size

      753KB

    • MD5

      15d4a1e3279eb0fb04c7adf6b29e0592

    • SHA1

      21ba93d34b09b1cd9591425dc49f6369e229ff0d

    • SHA256

      4928bb45a0e23f3b7299691aeebea28deb42ffb441a3bda3b405f347eb48f6a4

    • SHA512

      17ea5aa87b2ef01fc69f12fa53625a2d86174f41bcb1471f8cf9953c82a4b40ebfdd2aba8192fea168c784455abf3f60945c61a0bec7765d4e72a3fcc239a377

    • SSDEEP

      12288:GUYAa1a8LdeVrSSe+lP15WmpYshXZPbGwidNpgux:GUxa1a6eV+SeSP15WmD9idNpZ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks