General

  • Target

    5eb786afa5b0384e205667fd5d6da935db8d603d52bec7b8f21b4736e3c26761.bin

  • Size

    875KB

  • Sample

    240117-1w8yvafcar

  • MD5

    d375e4525aedede86b9eafc0a1d7bc88

  • SHA1

    05d19fee6f04e75e0d5d0be36954222ca4287bf2

  • SHA256

    5eb786afa5b0384e205667fd5d6da935db8d603d52bec7b8f21b4736e3c26761

  • SHA512

    90da4c9faba38aa2d07de636b45d5c0fbeb99693a9c595761f6222b624a584c7517abe03053476d5fd12cbb02e36473b46400c8d9a2f1a6e9c59ae6f723e12c8

  • SSDEEP

    12288:qo8fY0Ya1a8LVeCRmFN32EMAhbUFv3x8CDa5WmpYshXZPbGwidNpgiI:ZN0Ya1aKeCRS1bM6Ud/Da5WmD9idNpC

Score
10/10

Malware Config

Extracted

Family

spynote

C2

file-pursue.gl.at.ply.gg:1317

Targets

    • Target

      5eb786afa5b0384e205667fd5d6da935db8d603d52bec7b8f21b4736e3c26761.bin

    • Size

      875KB

    • MD5

      d375e4525aedede86b9eafc0a1d7bc88

    • SHA1

      05d19fee6f04e75e0d5d0be36954222ca4287bf2

    • SHA256

      5eb786afa5b0384e205667fd5d6da935db8d603d52bec7b8f21b4736e3c26761

    • SHA512

      90da4c9faba38aa2d07de636b45d5c0fbeb99693a9c595761f6222b624a584c7517abe03053476d5fd12cbb02e36473b46400c8d9a2f1a6e9c59ae6f723e12c8

    • SSDEEP

      12288:qo8fY0Ya1a8LVeCRmFN32EMAhbUFv3x8CDa5WmpYshXZPbGwidNpgiI:ZN0Ya1aKeCRS1bM6Ud/Da5WmD9idNpC

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks