General

  • Target

    61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07.bin

  • Size

    760KB

  • Sample

    250218-1zb4aazphk

  • MD5

    00836ca954adeda28913b561ac2f9740

  • SHA1

    e887847c2201483a337354eff56f14584c1ddc4e

  • SHA256

    61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07

  • SHA512

    f8c30e39d376738589cc94c621ec5e2a7123cd685f13b33a2df47f502fff4fa1abe87bef0dec50a42790726e56591b9eadc705ba2cf167a44885e7b44dc2295a

  • SSDEEP

    12288:lRp6dCnja1a8LdevF3od1+A5WmpYshXZPbGwidNpgBy:l76sa1a6evOd1+A5WmD9idNpL

Malware Config

Extracted

Family

spynote

C2

0.tcp.ngrok.io:14051

Targets

    • Target

      61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07.bin

    • Size

      760KB

    • MD5

      00836ca954adeda28913b561ac2f9740

    • SHA1

      e887847c2201483a337354eff56f14584c1ddc4e

    • SHA256

      61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07

    • SHA512

      f8c30e39d376738589cc94c621ec5e2a7123cd685f13b33a2df47f502fff4fa1abe87bef0dec50a42790726e56591b9eadc705ba2cf167a44885e7b44dc2295a

    • SSDEEP

      12288:lRp6dCnja1a8LdevF3od1+A5WmpYshXZPbGwidNpgBy:l76sa1a6evOd1+A5WmD9idNpL

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks