General

  • Target

    265b71a90e6d88bdfc9d298aadbf009d1ae942c86fea23f9c3f530dc02783885.bin

  • Size

    4.6MB

  • Sample

    250216-1wrpkazmgm

  • MD5

    b9cd25bebd85d52a8135dea3b109be08

  • SHA1

    a682c33285c1a5ad67014581b08968858ed746cb

  • SHA256

    265b71a90e6d88bdfc9d298aadbf009d1ae942c86fea23f9c3f530dc02783885

  • SHA512

    ad09224a5ea55c2ffca3ea4bf7bb14725981c9642677d102d43db6435e75bb6ae93bd1db92a5b61b6167f0977a43ec1890bb2eaed3c3d259bd83d7f5a2f0abe1

  • SSDEEP

    98304:ioUBWR6SQ8G16vWX0PQkgTLwUf2fraXM5r4LISxJ5yt7mnEGBK:ijSQ313kg3wUfml5riIIyt7mNw

Malware Config

Targets

    • Target

      265b71a90e6d88bdfc9d298aadbf009d1ae942c86fea23f9c3f530dc02783885.bin

    • Size

      4.6MB

    • MD5

      b9cd25bebd85d52a8135dea3b109be08

    • SHA1

      a682c33285c1a5ad67014581b08968858ed746cb

    • SHA256

      265b71a90e6d88bdfc9d298aadbf009d1ae942c86fea23f9c3f530dc02783885

    • SHA512

      ad09224a5ea55c2ffca3ea4bf7bb14725981c9642677d102d43db6435e75bb6ae93bd1db92a5b61b6167f0977a43ec1890bb2eaed3c3d259bd83d7f5a2f0abe1

    • SSDEEP

      98304:ioUBWR6SQ8G16vWX0PQkgTLwUf2fraXM5r4LISxJ5yt7mnEGBK:ijSQ313kg3wUfml5riIIyt7mNw

    • Spynote

      Spynote is a Remote Access Trojan first seen in 2017.

    • Spynote family

    • Spynote payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks