General

  • Target

    7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb

  • Size

    872KB

  • Sample

    231220-c8yrmsghdl

  • MD5

    13c92e9f42e088979aec18294243a156

  • SHA1

    3874539f9a21449b542529b6f599e0cf73367282

  • SHA256

    7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb

  • SHA512

    74a07a8caa5ac7d74343755c6a2a0b434ccf9bedc57aeeb93c8e8f0331d1a2f808d6a0dbfbac1612138d0cf9c9cfba4c8b2a7546594d71237d2dfa6c73fbc0ce

  • SSDEEP

    12288:IiBOchUtZB1XdVTF8k8hic3FIEayUNiDa1a8LM+x8u2Jmn:IOOc8BLf8k8hipRyUYa1aZ+Con

Score
10/10

Malware Config

Extracted

Family

spynote

C2

185.165.153.172:1337

Targets

    • Target

      7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb

    • Size

      872KB

    • MD5

      13c92e9f42e088979aec18294243a156

    • SHA1

      3874539f9a21449b542529b6f599e0cf73367282

    • SHA256

      7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb

    • SHA512

      74a07a8caa5ac7d74343755c6a2a0b434ccf9bedc57aeeb93c8e8f0331d1a2f808d6a0dbfbac1612138d0cf9c9cfba4c8b2a7546594d71237d2dfa6c73fbc0ce

    • SSDEEP

      12288:IiBOchUtZB1XdVTF8k8hic3FIEayUNiDa1a8LM+x8u2Jmn:IOOc8BLf8k8hipRyUYa1aZ+Con

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks