General

  • Target

    75dbcdb7c9eb004c7a53e1265e7ab3350f401a3983c598e27fbcf71854f159d8.bin

  • Size

    3.8MB

  • Sample

    250520-1w2jrscr4s

  • MD5

    36d6bd3164ea98730c939f133b79aad1

  • SHA1

    1d1d36f98c52f86022e799dee22e4444e4b91b99

  • SHA256

    75dbcdb7c9eb004c7a53e1265e7ab3350f401a3983c598e27fbcf71854f159d8

  • SHA512

    160a440bcc48c7f5da67e939ec9334f5126f502a5e0077cedb9ce61dfff7c01b40d988ae56f8fb55af301ed5bc6d7c1ebdf91c5f3c05c1a80947e30c792c94ad

  • SSDEEP

    98304:q3WlcXk4TO8qLvHkGMYp1srm/MpW8AB0WRKg0UmxUhpDw:qwcXkKOLeYwq/2hAmg0WDw

Malware Config

Extracted

Family

spynote

C2

34.205.62.148:7771

Targets

    • Target

      75dbcdb7c9eb004c7a53e1265e7ab3350f401a3983c598e27fbcf71854f159d8.bin

    • Size

      3.8MB

    • MD5

      36d6bd3164ea98730c939f133b79aad1

    • SHA1

      1d1d36f98c52f86022e799dee22e4444e4b91b99

    • SHA256

      75dbcdb7c9eb004c7a53e1265e7ab3350f401a3983c598e27fbcf71854f159d8

    • SHA512

      160a440bcc48c7f5da67e939ec9334f5126f502a5e0077cedb9ce61dfff7c01b40d988ae56f8fb55af301ed5bc6d7c1ebdf91c5f3c05c1a80947e30c792c94ad

    • SSDEEP

      98304:q3WlcXk4TO8qLvHkGMYp1srm/MpW8AB0WRKg0UmxUhpDw:qwcXkKOLeYwq/2hAmg0WDw

    • Spynote

      Spynote is a Remote Access Trojan first seen in 2017.

    • Spynote family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the content of the SMS messages.

    • Acquires the wake lock

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v16

Tasks