General

  • Target

    d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe.bin

  • Size

    760KB

  • Sample

    250403-14k7ravxe1

  • MD5

    3972db855225d8d482d40600debaf5a7

  • SHA1

    5925dd0c66359bf0b892893a9d201016f1fb2d4b

  • SHA256

    d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe

  • SHA512

    e23a3243afcc2f5fc957db1b3a0b5244a6758c939175e86b6fae5b452c5074fa286e78249ecfa70c1a011c50344f39460c1244d00750e96b51946dc7762e2594

  • SSDEEP

    12288:ZxA0a1a8Lze2HE3YG7ipl5WmpYshXZPbGwidNpgwUN:Z/a1ame2qYMipl5WmD9idNp+N

Malware Config

Extracted

Family

spynote

C2

spring-plasma.gl.at.ply.gg:7331

Targets

    • Target

      d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe.bin

    • Size

      760KB

    • MD5

      3972db855225d8d482d40600debaf5a7

    • SHA1

      5925dd0c66359bf0b892893a9d201016f1fb2d4b

    • SHA256

      d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe

    • SHA512

      e23a3243afcc2f5fc957db1b3a0b5244a6758c939175e86b6fae5b452c5074fa286e78249ecfa70c1a011c50344f39460c1244d00750e96b51946dc7762e2594

    • SSDEEP

      12288:ZxA0a1a8Lze2HE3YG7ipl5WmpYshXZPbGwidNpgwUN:Z/a1ame2qYMipl5WmD9idNp+N

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks