General

  • Target

    e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d.bin

  • Size

    768KB

  • Sample

    250212-1yq6taypbj

  • MD5

    3c8d9bf5f11bac573dfa056bbc8c9489

  • SHA1

    75525dec35a1d6ca70306395d2921c7f4c281f5f

  • SHA256

    e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d

  • SHA512

    b6520647c1969f05e78185bd17f37de71d4edeb72d6ed0a519157d6e1b398f31699d519b9e8a3dfd3b81d21f5c4564fe89d8a177c1077176c10941206362d150

  • SSDEEP

    12288:A2FtmSHGC47DwrAbSj+oA5WmpYshXZPbGwidNpgvV:JFtjmC47DwrAbHX5WmD9idNpeV

Malware Config

Extracted

Family

spynote

C2

serveo.net:9585

Targets

    • Target

      e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d.bin

    • Size

      768KB

    • MD5

      3c8d9bf5f11bac573dfa056bbc8c9489

    • SHA1

      75525dec35a1d6ca70306395d2921c7f4c281f5f

    • SHA256

      e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d

    • SHA512

      b6520647c1969f05e78185bd17f37de71d4edeb72d6ed0a519157d6e1b398f31699d519b9e8a3dfd3b81d21f5c4564fe89d8a177c1077176c10941206362d150

    • SSDEEP

      12288:A2FtmSHGC47DwrAbSj+oA5WmpYshXZPbGwidNpgvV:JFtjmC47DwrAbHX5WmD9idNpeV

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks