General

  • Target

    b88f65ab20adaa7f9a937b855d308536c6ec5fbdf5f2f4aa73b4d8dcd00677b3.bin

  • Size

    760KB

  • Sample

    250329-136gasvse1

  • MD5

    0b8dee255ad85922d02d29abfa439813

  • SHA1

    28b1aef7b4ca008302229a98c93ac03713e2480a

  • SHA256

    b88f65ab20adaa7f9a937b855d308536c6ec5fbdf5f2f4aa73b4d8dcd00677b3

  • SHA512

    4761cb23ec3074c21be2d9a4adbec10c77197f942f72bc09487fe887e16c758dbd1817375b6d3bd131ed2a1c9ab5caf1f4781ac54e17daaea4d412f3b34fd598

  • SSDEEP

    12288:kg4qE/J6sgRALz+Hs/Q5Bt5WmpYshXZPbGwidNpg6ro:kg2/J6sjLz+qQ5Bt5WmD9idNpM

Malware Config

Extracted

Family

spynote

C2

20.ip.gl.ply.gg:23503

Targets

    • Target

      b88f65ab20adaa7f9a937b855d308536c6ec5fbdf5f2f4aa73b4d8dcd00677b3.bin

    • Size

      760KB

    • MD5

      0b8dee255ad85922d02d29abfa439813

    • SHA1

      28b1aef7b4ca008302229a98c93ac03713e2480a

    • SHA256

      b88f65ab20adaa7f9a937b855d308536c6ec5fbdf5f2f4aa73b4d8dcd00677b3

    • SHA512

      4761cb23ec3074c21be2d9a4adbec10c77197f942f72bc09487fe887e16c758dbd1817375b6d3bd131ed2a1c9ab5caf1f4781ac54e17daaea4d412f3b34fd598

    • SSDEEP

      12288:kg4qE/J6sgRALz+Hs/Q5Bt5WmpYshXZPbGwidNpg6ro:kg2/J6sjLz+qQ5Bt5WmD9idNpM

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks