General

  • Target

    7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb.bin

  • Size

    784KB

  • Sample

    250215-1yccnawphj

  • MD5

    4563b843f79f5ef48e91b2ccaf838c6a

  • SHA1

    1595dbd5913705c19fd9238f6463f617434ba571

  • SHA256

    7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb

  • SHA512

    8b51ede15f9f63198166211a108bb41155610f22b2d865e90f346fed8221df0d8203f8562598fd56e18f0cd62f7c9a1673f476c45b7349f99bec90272352b9da

  • SSDEEP

    12288:KQt/0ua1a8LdenRe99asv5qA5WmpYshXZPbGwidNpgf4O:nXa1a6enRi9Z5qA5WmD9idNpy

Malware Config

Extracted

Family

spynote

C2

184.174.97.115:5002

Targets

    • Target

      7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb.bin

    • Size

      784KB

    • MD5

      4563b843f79f5ef48e91b2ccaf838c6a

    • SHA1

      1595dbd5913705c19fd9238f6463f617434ba571

    • SHA256

      7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb

    • SHA512

      8b51ede15f9f63198166211a108bb41155610f22b2d865e90f346fed8221df0d8203f8562598fd56e18f0cd62f7c9a1673f476c45b7349f99bec90272352b9da

    • SSDEEP

      12288:KQt/0ua1a8LdenRe99asv5qA5WmpYshXZPbGwidNpgf4O:nXa1a6enRi9Z5qA5WmD9idNpy

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks