General

  • Target

    5cfd96f79472c165e4ea4ec6eff47f2af3c02a76445de43df9119565c8cb337f.bin

  • Size

    760KB

  • Sample

    250213-13k6csxjbt

  • MD5

    64a1fc1d437ebf92f9170cf4b25cddd5

  • SHA1

    8e929b102900f1406bb604408b56ae9ea12d32bf

  • SHA256

    5cfd96f79472c165e4ea4ec6eff47f2af3c02a76445de43df9119565c8cb337f

  • SHA512

    2baf853e12495ce6622279a0f8c87146e440c8652d17a75a0d72d72452a309f547dc704aaf038301f8e7563556a8d244079054aa14247c07c33b524f087988cf

  • SSDEEP

    12288:mtRRJ6sgRALzcLbTGo95WmpYshXZPbGwidNpgoqc:mhJ6s7LzcvTGo95WmD9idNpL

Malware Config

Extracted

Family

spynote

C2

ebat-58871.portmap.host:56995

Targets

    • Target

      5cfd96f79472c165e4ea4ec6eff47f2af3c02a76445de43df9119565c8cb337f.bin

    • Size

      760KB

    • MD5

      64a1fc1d437ebf92f9170cf4b25cddd5

    • SHA1

      8e929b102900f1406bb604408b56ae9ea12d32bf

    • SHA256

      5cfd96f79472c165e4ea4ec6eff47f2af3c02a76445de43df9119565c8cb337f

    • SHA512

      2baf853e12495ce6622279a0f8c87146e440c8652d17a75a0d72d72452a309f547dc704aaf038301f8e7563556a8d244079054aa14247c07c33b524f087988cf

    • SSDEEP

      12288:mtRRJ6sgRALzcLbTGo95WmpYshXZPbGwidNpgoqc:mhJ6s7LzcvTGo95WmD9idNpL

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks