General

  • Target

    ae9629a0282692cfd71f4c9db75f86c9405e4286666577b6f509774af00b126c.bin

  • Size

    772KB

  • Sample

    240122-1xbdzaebe2

  • MD5

    ab41f5156cf3cc443ee1602464499ac2

  • SHA1

    98f0737cb41d2a37ec7e24329062498cb1a5159c

  • SHA256

    ae9629a0282692cfd71f4c9db75f86c9405e4286666577b6f509774af00b126c

  • SHA512

    b54a94c0f2174ba205763f01c0cec1b30ca4c755d89a6044390a6a2f4d33fb11788b3219358dcd2bca4be3c2b40443e35c46c04d52510ee97b7dcb24687c6c5c

  • SSDEEP

    12288:cusOIa1a8LzePgYJvfUllIG5WmpYshXZPbGwidNpgKq:cu1Ia1amePgY5fslIG5WmD9idNpnq

Score
10/10

Malware Config

Extracted

Family

spynote

C2

badario-58914.portmap.host:64805

Targets

    • Target

      ae9629a0282692cfd71f4c9db75f86c9405e4286666577b6f509774af00b126c.bin

    • Size

      772KB

    • MD5

      ab41f5156cf3cc443ee1602464499ac2

    • SHA1

      98f0737cb41d2a37ec7e24329062498cb1a5159c

    • SHA256

      ae9629a0282692cfd71f4c9db75f86c9405e4286666577b6f509774af00b126c

    • SHA512

      b54a94c0f2174ba205763f01c0cec1b30ca4c755d89a6044390a6a2f4d33fb11788b3219358dcd2bca4be3c2b40443e35c46c04d52510ee97b7dcb24687c6c5c

    • SSDEEP

      12288:cusOIa1a8LzePgYJvfUllIG5WmpYshXZPbGwidNpgKq:cu1Ia1amePgY5fslIG5WmD9idNpnq

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks