General

  • Target

    8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb

  • Size

    764KB

  • Sample

    231220-jap56scgb6

  • MD5

    7021967618ce74e38b94e17edaabab76

  • SHA1

    ec5660ae6a5a36120f05e8e1bc51e66082f52596

  • SHA256

    8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb

  • SHA512

    112c07a47d969e15bf84973c881f5c59313b1a5316e2b4a3bddea57c2f07842755e0b7abe4e78a49ba9d0ee99d11eb2a8af3866b80df5c85abb8adb2f9735ef2

  • SSDEEP

    12288:Cha1a8LreslmlEhR5WmpYshXZPbGwidNpguMo:ua1a2es0lEhR5WmD9idNpt

Malware Config

Extracted

Family

spynote

C2

7.tcp.eu.ngrok.io:11560

Targets

    • Target

      8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb

    • Size

      764KB

    • MD5

      7021967618ce74e38b94e17edaabab76

    • SHA1

      ec5660ae6a5a36120f05e8e1bc51e66082f52596

    • SHA256

      8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb

    • SHA512

      112c07a47d969e15bf84973c881f5c59313b1a5316e2b4a3bddea57c2f07842755e0b7abe4e78a49ba9d0ee99d11eb2a8af3866b80df5c85abb8adb2f9735ef2

    • SSDEEP

      12288:Cha1a8LreslmlEhR5WmpYshXZPbGwidNpguMo:ua1a2es0lEhR5WmD9idNpt

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

MITRE ATT&CK Matrix

Tasks