General

  • Target

    74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72.bin

  • Size

    760KB

  • Sample

    250213-13apmawmbp

  • MD5

    0c07b87d3d9e4dd03bf019a9186097d1

  • SHA1

    2f8263c1676b047acc3dd7ac166eb1d313c9a8da

  • SHA256

    74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72

  • SHA512

    a49f4f0a4e61d83c7e058df918dfa411aab2477e4d5cb97f4885e41f6825ab6e44d2aa3c69e3cd9b2a53d1fdcf0c224d85ea129ab3f7ca4108ac4c40216cde7c

  • SSDEEP

    12288:PhOVYwV6La1a8LrexrFtFQOY5WmpYshXZPbGwidNpghE5:P8CPa1a2exbFQOY5WmD9idNpZ

Malware Config

Extracted

Family

spynote

C2

0.tcp.ngrok.io:14051

Targets

    • Target

      74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72.bin

    • Size

      760KB

    • MD5

      0c07b87d3d9e4dd03bf019a9186097d1

    • SHA1

      2f8263c1676b047acc3dd7ac166eb1d313c9a8da

    • SHA256

      74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72

    • SHA512

      a49f4f0a4e61d83c7e058df918dfa411aab2477e4d5cb97f4885e41f6825ab6e44d2aa3c69e3cd9b2a53d1fdcf0c224d85ea129ab3f7ca4108ac4c40216cde7c

    • SSDEEP

      12288:PhOVYwV6La1a8LrexrFtFQOY5WmpYshXZPbGwidNpghE5:P8CPa1a2exbFQOY5WmD9idNpZ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks