General

  • Target

    5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4.bin

  • Size

    4.5MB

  • Sample

    250212-1ykc9sypam

  • MD5

    429b0b247f3df5d5964a86a0b91bf3dd

  • SHA1

    3f47af171af0cbc4c9b06bacd31b06c098eaf4bd

  • SHA256

    5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4

  • SHA512

    ae41597e729558af6d7d93d32a754c576448243c3d6106c33457e310272f19fc9dfadf1b561e214d416de039f6f083dc00ec61e6bbc9285944bee1ae3c08a350

  • SSDEEP

    98304:9Ub3SihZoo+ruOqVuq/qIEdrbfJ7rDWRXGBQlcc:w3Si74uZFqIEDr7yac

Malware Config

Targets

    • Target

      5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4.bin

    • Size

      4.5MB

    • MD5

      429b0b247f3df5d5964a86a0b91bf3dd

    • SHA1

      3f47af171af0cbc4c9b06bacd31b06c098eaf4bd

    • SHA256

      5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4

    • SHA512

      ae41597e729558af6d7d93d32a754c576448243c3d6106c33457e310272f19fc9dfadf1b561e214d416de039f6f083dc00ec61e6bbc9285944bee1ae3c08a350

    • SSDEEP

      98304:9Ub3SihZoo+ruOqVuq/qIEdrbfJ7rDWRXGBQlcc:w3Si74uZFqIEDr7yac

    • Spynote

      Spynote is a Remote Access Trojan first seen in 2017.

    • Spynote family

    • Spynote payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks