General

  • Target

    f8742c1ea1d559fb47c3189724164811b1377f06db7bc3ce3cc05613e60a6ea3.bin

  • Size

    760KB

  • Sample

    250329-1wv2zstzhy

  • MD5

    86a50ae0ade9814431c11832668e5e3e

  • SHA1

    087dc6a683d19334cff4d0ac401dc50741fec8eb

  • SHA256

    f8742c1ea1d559fb47c3189724164811b1377f06db7bc3ce3cc05613e60a6ea3

  • SHA512

    6329059250bb9bbe0f1ba3996fdac5d33390b907eb553a30027c848fa8763eab7edc3d94c9a1904be62b013308337d7045a6a00b246b992a57c9788d903ff22c

  • SSDEEP

    12288:/HFWt1a1a8Lde19tcbXQ25WmpYshXZPbGwidNpgFi:/lqa1a6e1UbXQ25WmD9idNpT

Malware Config

Extracted

Family

spynote

C2

ma-toddler.gl.at.ply.gg:57836

Targets

    • Target

      f8742c1ea1d559fb47c3189724164811b1377f06db7bc3ce3cc05613e60a6ea3.bin

    • Size

      760KB

    • MD5

      86a50ae0ade9814431c11832668e5e3e

    • SHA1

      087dc6a683d19334cff4d0ac401dc50741fec8eb

    • SHA256

      f8742c1ea1d559fb47c3189724164811b1377f06db7bc3ce3cc05613e60a6ea3

    • SHA512

      6329059250bb9bbe0f1ba3996fdac5d33390b907eb553a30027c848fa8763eab7edc3d94c9a1904be62b013308337d7045a6a00b246b992a57c9788d903ff22c

    • SSDEEP

      12288:/HFWt1a1a8Lde19tcbXQ25WmpYshXZPbGwidNpgFi:/lqa1a6e1UbXQ25WmD9idNpT

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks