General

  • Target

    c689422b4a21e030017d6f8156940f5e5b8d32182b4e3d4c7c05dda341fc707d.bin

  • Size

    760KB

  • Sample

    250216-1wx7cazmhm

  • MD5

    f6fd4618b5f8dc8e19ba81022e843eaa

  • SHA1

    430b1f13e6a7588f739b59f6dd4c2dba87130618

  • SHA256

    c689422b4a21e030017d6f8156940f5e5b8d32182b4e3d4c7c05dda341fc707d

  • SHA512

    ef685e1a93b89572e9467b0538d0192ab3c37b927f982ff7b2a7979fbb677f09c19a45590b901b7120f0fc7a1bf74d72966f29cc85934d25324d625223159ca1

  • SSDEEP

    12288:Jzy0e94a1a8LzeDrXnns465WmpYshXZPbGwidNpgDE:J+0Na1ameD7ns465WmD9idNp/

Malware Config

Extracted

Family

spynote

C2

147.185.221.26:7576

Targets

    • Target

      c689422b4a21e030017d6f8156940f5e5b8d32182b4e3d4c7c05dda341fc707d.bin

    • Size

      760KB

    • MD5

      f6fd4618b5f8dc8e19ba81022e843eaa

    • SHA1

      430b1f13e6a7588f739b59f6dd4c2dba87130618

    • SHA256

      c689422b4a21e030017d6f8156940f5e5b8d32182b4e3d4c7c05dda341fc707d

    • SHA512

      ef685e1a93b89572e9467b0538d0192ab3c37b927f982ff7b2a7979fbb677f09c19a45590b901b7120f0fc7a1bf74d72966f29cc85934d25324d625223159ca1

    • SSDEEP

      12288:Jzy0e94a1a8LzeDrXnns465WmpYshXZPbGwidNpgDE:J+0Na1ameD7ns465WmD9idNp/

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks