General

  • Target

    b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52.bin

  • Size

    746KB

  • Sample

    250219-1xbpqszpcq

  • MD5

    385f3c463073b26073e8ab94a0558b01

  • SHA1

    e2bb4a6490a3b04b0b78ed55ada472537e1f0596

  • SHA256

    b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52

  • SHA512

    689ea40334e7826e772dec4ddebb8d0a1eec9ebf61c0f849a2d49569f67be4392a110173557aa6374a539c20b4bcda7ec0c5907e277c1344152dbd739248da86

  • SSDEEP

    12288:2m2U/a1a8LdeLb9g2SDjK5WmpYshXZPbGwidNpgat4:7Fa1a6eLb9PSDjK5WmD9idNpZC

Malware Config

Extracted

Family

spynote

C2

26.ip.gl.ply.gg:9039

Targets

    • Target

      b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52.bin

    • Size

      746KB

    • MD5

      385f3c463073b26073e8ab94a0558b01

    • SHA1

      e2bb4a6490a3b04b0b78ed55ada472537e1f0596

    • SHA256

      b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52

    • SHA512

      689ea40334e7826e772dec4ddebb8d0a1eec9ebf61c0f849a2d49569f67be4392a110173557aa6374a539c20b4bcda7ec0c5907e277c1344152dbd739248da86

    • SSDEEP

      12288:2m2U/a1a8LdeLb9g2SDjK5WmpYshXZPbGwidNpgat4:7Fa1a6eLb9PSDjK5WmD9idNpZC

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks