General

  • Target

    0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48.bin

  • Size

    760KB

  • Sample

    250220-1wvq8awlat

  • MD5

    3f510a63bf96423f1e8f388448bba010

  • SHA1

    b7280206684a54b55dd31c55f3972a51aaa885dd

  • SHA256

    0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48

  • SHA512

    d300c78ba42e1e192646e6d8f5d009c295644e3ee5e8060f1c6d29ff6400e0e9b69d574df5c4447fd2ba4ecc6d17192d9a1cdfa4ab71afffde092e59d23fd0df

  • SSDEEP

    12288:BeLCtHa1a8LVe7XPrX4IK5WmpYshXZPbGwidNpgYl2:BeLsa1aKe7zX4IK5WmD9idNpM

Malware Config

Extracted

Family

spynote

C2

25.ip.gl.ply.gg:51065

Targets

    • Target

      0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48.bin

    • Size

      760KB

    • MD5

      3f510a63bf96423f1e8f388448bba010

    • SHA1

      b7280206684a54b55dd31c55f3972a51aaa885dd

    • SHA256

      0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48

    • SHA512

      d300c78ba42e1e192646e6d8f5d009c295644e3ee5e8060f1c6d29ff6400e0e9b69d574df5c4447fd2ba4ecc6d17192d9a1cdfa4ab71afffde092e59d23fd0df

    • SSDEEP

      12288:BeLCtHa1a8LVe7XPrX4IK5WmpYshXZPbGwidNpgYl2:BeLsa1aKe7zX4IK5WmD9idNpM

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks