General

  • Target

    c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108.bin

  • Size

    760KB

  • Sample

    240701-1yattswepk

  • MD5

    dd706709ea5959156286c83460828486

  • SHA1

    799d80c6b7a6838c489f571c27643779d7c320f8

  • SHA256

    c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108

  • SHA512

    7f1255bc402cad39ab424096397064b8c7bc1ddfe9b74a13af588338aaff647298ce4c72ce272cd617ed34b47791e8bd3de4284a4ca58d2a8e05a477091db9c5

  • SSDEEP

    12288:5MJWpQa1a8LreAzetCUzn5WmpYshXZPbGwidNpgb:SJ1a1a2eAqCUzn5WmD9idNpo

Malware Config

Extracted

Family

spynote

C2

currently-judges.gl.at.ply.gg:33065

Targets

    • Target

      c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108.bin

    • Size

      760KB

    • MD5

      dd706709ea5959156286c83460828486

    • SHA1

      799d80c6b7a6838c489f571c27643779d7c320f8

    • SHA256

      c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108

    • SHA512

      7f1255bc402cad39ab424096397064b8c7bc1ddfe9b74a13af588338aaff647298ce4c72ce272cd617ed34b47791e8bd3de4284a4ca58d2a8e05a477091db9c5

    • SSDEEP

      12288:5MJWpQa1a8LreAzetCUzn5WmpYshXZPbGwidNpgb:SJ1a1a2eAqCUzn5WmD9idNpo

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks