General

  • Target

    c8e50c6616c4a5074176c39173bcc30ec2f1d2113f4fdb65be5801c3e7001f23.bin

  • Size

    760KB

  • Sample

    240117-1xx8qsgae4

  • MD5

    a8a603d1ee0864a32cbbd84ccd6bd946

  • SHA1

    1fa9d87db9d3b8f9aec74aed50115adb7e362661

  • SHA256

    c8e50c6616c4a5074176c39173bcc30ec2f1d2113f4fdb65be5801c3e7001f23

  • SHA512

    f24d8f017ab5fb21cbf8abd422c4ed394bae170d939195704f38cb560605140c4e70d8a6308b391b73d0afc060db33613ffa882a2e4399f759432daa04f73881

  • SSDEEP

    12288:zyabR0a1a8LVep95YvRsa5WmpYshXZPbGwidNpglJ:zyaia1aKepMvRsa5WmD9idNpE

Score
10/10

Malware Config

Extracted

Family

spynote

C2

tr3.localto.net:42447

Targets

    • Target

      c8e50c6616c4a5074176c39173bcc30ec2f1d2113f4fdb65be5801c3e7001f23.bin

    • Size

      760KB

    • MD5

      a8a603d1ee0864a32cbbd84ccd6bd946

    • SHA1

      1fa9d87db9d3b8f9aec74aed50115adb7e362661

    • SHA256

      c8e50c6616c4a5074176c39173bcc30ec2f1d2113f4fdb65be5801c3e7001f23

    • SHA512

      f24d8f017ab5fb21cbf8abd422c4ed394bae170d939195704f38cb560605140c4e70d8a6308b391b73d0afc060db33613ffa882a2e4399f759432daa04f73881

    • SSDEEP

      12288:zyabR0a1a8LVep95YvRsa5WmpYshXZPbGwidNpglJ:zyaia1aKepMvRsa5WmD9idNpE

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks