General

  • Target

    f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff.bin

  • Size

    853KB

  • Sample

    250401-1yjrqsw1ds

  • MD5

    87a848474afdba18cda4439b726b3d43

  • SHA1

    b42772efc4765972ed8602c1c5325ac05fce2c70

  • SHA256

    f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff

  • SHA512

    081d902f29b35abfd8144f200ce6dd7b4ffd9ea2a661112a418d0461f083dab00b9a026cfd264cef6917a978150c4a0ae60a8cdfac0ce2be7fda48ef4050f7fb

  • SSDEEP

    12288:7Svk7hZva1a8Lze54yYc8hu7dds1KyS5WmpYshXZPbGwidNpg2:+vk7zva1ame5lYhhEM1KyS5WmD9idNp5

Malware Config

Extracted

Family

spynote

C2

famatec840-20359.portmap.host:20359

Targets

    • Target

      f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff.bin

    • Size

      853KB

    • MD5

      87a848474afdba18cda4439b726b3d43

    • SHA1

      b42772efc4765972ed8602c1c5325ac05fce2c70

    • SHA256

      f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff

    • SHA512

      081d902f29b35abfd8144f200ce6dd7b4ffd9ea2a661112a418d0461f083dab00b9a026cfd264cef6917a978150c4a0ae60a8cdfac0ce2be7fda48ef4050f7fb

    • SSDEEP

      12288:7Svk7hZva1a8Lze54yYc8hu7dds1KyS5WmpYshXZPbGwidNpg2:+vk7zva1ame5lYhhEM1KyS5WmD9idNp5

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks