General

  • Target

    1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd.bin

  • Size

    760KB

  • Sample

    250220-1wwnhsxqz7

  • MD5

    e4f204a48558988e9971beeee98b2e44

  • SHA1

    463b315ec2becf20458f876cc99992947b2cd365

  • SHA256

    1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd

  • SHA512

    8f0165fcf37af5b32ea6a6695e530f40604b29fc27e705a2ad81f64191a0f28e6373365c3f6771144a6df7291b636014fff7a093c1b1ff902852f315e8287aa4

  • SSDEEP

    12288:uHgv+da1a8LreMzmT+ZXT5WmpYshXZPbGwidNpg5W:uHg6a1a2eMk+ZXT5WmD9idNp/

Malware Config

Extracted

Family

spynote

C2

comes-sticker.gl.at.ply.gg:7499

Targets

    • Target

      1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd.bin

    • Size

      760KB

    • MD5

      e4f204a48558988e9971beeee98b2e44

    • SHA1

      463b315ec2becf20458f876cc99992947b2cd365

    • SHA256

      1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd

    • SHA512

      8f0165fcf37af5b32ea6a6695e530f40604b29fc27e705a2ad81f64191a0f28e6373365c3f6771144a6df7291b636014fff7a093c1b1ff902852f315e8287aa4

    • SSDEEP

      12288:uHgv+da1a8LreMzmT+ZXT5WmpYshXZPbGwidNpg5W:uHg6a1a2eMk+ZXT5WmD9idNp/

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks