General

  • Target

    7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f.bin

  • Size

    760KB

  • Sample

    250328-1xkbwassft

  • MD5

    cdb30e9543bd02cc82eb1ce975f7a206

  • SHA1

    0e6fa76a1369b4fc858a940b19ab2767b76c3050

  • SHA256

    7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f

  • SHA512

    ce3648a822d7795b75e0ab592106c4e02594b1deb7497041fb87d7dbb1aacf20bfeec58ae1a890bf789ab523e6f46307d403366b25952d9984120b8508543766

  • SSDEEP

    12288:rxJK8/J6sgRALzyfIjYRlR5WmpYshXZPbGwidNpgbrE:rxH/J6sjLzy2YRlR5WmD9idNpL

Malware Config

Extracted

Family

spynote

C2

20.ip.gl.ply.gg:23503

Targets

    • Target

      7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f.bin

    • Size

      760KB

    • MD5

      cdb30e9543bd02cc82eb1ce975f7a206

    • SHA1

      0e6fa76a1369b4fc858a940b19ab2767b76c3050

    • SHA256

      7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f

    • SHA512

      ce3648a822d7795b75e0ab592106c4e02594b1deb7497041fb87d7dbb1aacf20bfeec58ae1a890bf789ab523e6f46307d403366b25952d9984120b8508543766

    • SSDEEP

      12288:rxJK8/J6sgRALzyfIjYRlR5WmpYshXZPbGwidNpgbrE:rxH/J6sjLzy2YRlR5WmD9idNpL

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks