General

  • Target

    9db3d7a0c657c5abbe688ab61638cd14d905484b1b9c4906a347922fc7e30e84

  • Size

    3.9MB

  • Sample

    250221-fa7tfavpt9

  • MD5

    0116c96dce400053d1348a2626032efd

  • SHA1

    0218c087f748073cc4d2b3693a259bf240c897cf

  • SHA256

    9db3d7a0c657c5abbe688ab61638cd14d905484b1b9c4906a347922fc7e30e84

  • SHA512

    164de2e1b097879eb74ba16ee55045b6cbcf77ca669fb5195395721e8cdce48c97e31308f74db37cc6adb377cad603b2d158995cffc8e56fd9d01cb1b3c5a909

  • SSDEEP

    98304:mPKZLILt8f33dv8mzzzBRT1h0tplH+ODJ:mPKZLzf33trz/4F

Malware Config

Extracted

Family

spynote

C2

206.119.117.107:7771

Targets

    • Target

      9db3d7a0c657c5abbe688ab61638cd14d905484b1b9c4906a347922fc7e30e84

    • Size

      3.9MB

    • MD5

      0116c96dce400053d1348a2626032efd

    • SHA1

      0218c087f748073cc4d2b3693a259bf240c897cf

    • SHA256

      9db3d7a0c657c5abbe688ab61638cd14d905484b1b9c4906a347922fc7e30e84

    • SHA512

      164de2e1b097879eb74ba16ee55045b6cbcf77ca669fb5195395721e8cdce48c97e31308f74db37cc6adb377cad603b2d158995cffc8e56fd9d01cb1b3c5a909

    • SSDEEP

      98304:mPKZLILt8f33dv8mzzzBRT1h0tplH+ODJ:mPKZLzf33trz/4F

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks