General

  • Target

    a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d.bin

  • Size

    760KB

  • Sample

    250402-115rzsxky4

  • MD5

    da92668834d7f2f98345cb0e6f36e6a7

  • SHA1

    b79e8547ca99a324fbbcbc597ba8fb36d691fe44

  • SHA256

    a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d

  • SHA512

    a9af147f7ec2a0a00c93727a478b215d95eef0acf7f9ffd9370eaa363e143fc58ce8bb2870c30636fcff9f6f8fceeff7970ed015f4eb3172944c4f5cb84cbfaf

  • SSDEEP

    12288:dbVUSba1a8Ldey/UHAjRd5WmpYshXZPbGwidNpg/p9I:dza1a6ey6AjRd5WmD9idNpn

Malware Config

Extracted

Family

spynote

C2

total-enclosure.gl.at.ply.gg:15954

Targets

    • Target

      a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d.bin

    • Size

      760KB

    • MD5

      da92668834d7f2f98345cb0e6f36e6a7

    • SHA1

      b79e8547ca99a324fbbcbc597ba8fb36d691fe44

    • SHA256

      a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d

    • SHA512

      a9af147f7ec2a0a00c93727a478b215d95eef0acf7f9ffd9370eaa363e143fc58ce8bb2870c30636fcff9f6f8fceeff7970ed015f4eb3172944c4f5cb84cbfaf

    • SSDEEP

      12288:dbVUSba1a8Ldey/UHAjRd5WmpYshXZPbGwidNpg/p9I:dza1a6ey6AjRd5WmD9idNpn

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks