Resubmissions

06-10-2023 18:08

231006-wq5l1seh6y 10

06-10-2023 18:01

231006-wl3lvsgh87 10

General

  • Target

    55710744002873ae31cf9d9b2480b765acb5a2ced1518c491f6ee55b6842a425

  • Size

    2.0MB

  • Sample

    231006-wq5l1seh6y

  • MD5

    c88a7aea7a624e26209ca49b84bb19c4

  • SHA1

    e11bf9286e0fb73370edaff2ca89518f18cb65cf

  • SHA256

    55710744002873ae31cf9d9b2480b765acb5a2ced1518c491f6ee55b6842a425

  • SHA512

    245a2e6055a226f460c0276e55a59a23ace11ab63fa00e611366721a6277eea9ac5e6b44079b0c221874fc042bcfd252125df302fa39780e8e2e430adaa585d7

  • SSDEEP

    12288:WolF2l+3jED0va6H1RFQEyuz4Zy7Ir9ZZpRlKLA+gAlj6Z:Woa96pQE6Z8+9ZZXslj6Z

Malware Config

Extracted

Family

spynote

C2

0.tcp.sa.ngrok.io:18761

Targets

    • Target

      55710744002873ae31cf9d9b2480b765acb5a2ced1518c491f6ee55b6842a425

    • Size

      2.0MB

    • MD5

      c88a7aea7a624e26209ca49b84bb19c4

    • SHA1

      e11bf9286e0fb73370edaff2ca89518f18cb65cf

    • SHA256

      55710744002873ae31cf9d9b2480b765acb5a2ced1518c491f6ee55b6842a425

    • SHA512

      245a2e6055a226f460c0276e55a59a23ace11ab63fa00e611366721a6277eea9ac5e6b44079b0c221874fc042bcfd252125df302fa39780e8e2e430adaa585d7

    • SSDEEP

      12288:WolF2l+3jED0va6H1RFQEyuz4Zy7Ir9ZZpRlKLA+gAlj6Z:Woa96pQE6Z8+9ZZXslj6Z

    • Makes use of the framework's Accessibility service.

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Legitimate hosting services abused for malware hosting/C2

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix ATT&CK v13

Tasks