General

  • Target

    77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086.bin

  • Size

    760KB

  • Sample

    250331-1ynqpayxby

  • MD5

    81f9472c1e95adc6536c30af2ea373fb

  • SHA1

    9be36cb6aa0fc5fbd5b74e054c11d4e7f00882c0

  • SHA256

    77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086

  • SHA512

    fa6c61d7b5a2ba4c758ee94c853843f29fb092bae4ad5025fe18ac1f559221fbff7a89b55f682587c4225f0eeb66a15fc566bbe730550479a878414424e8f90f

  • SSDEEP

    12288:6AJsa1a8LzeYjWlKTrf5WmpYshXZPbGwidNpgx:6A2a1ameY6KTrf5WmD9idNpa

Malware Config

Extracted

Family

spynote

C2

192.168.1.72:2225

Targets

    • Target

      77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086.bin

    • Size

      760KB

    • MD5

      81f9472c1e95adc6536c30af2ea373fb

    • SHA1

      9be36cb6aa0fc5fbd5b74e054c11d4e7f00882c0

    • SHA256

      77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086

    • SHA512

      fa6c61d7b5a2ba4c758ee94c853843f29fb092bae4ad5025fe18ac1f559221fbff7a89b55f682587c4225f0eeb66a15fc566bbe730550479a878414424e8f90f

    • SSDEEP

      12288:6AJsa1a8LzeYjWlKTrf5WmpYshXZPbGwidNpgx:6A2a1ameY6KTrf5WmD9idNpa

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks