General

  • Target

    595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0.bin

  • Size

    750KB

  • Sample

    240206-1xqhwshce5

  • MD5

    e7969507b6db67d08d6c319273ea94af

  • SHA1

    42273f9cdf9c52d3ac852e8ae4fee56ec8504559

  • SHA256

    595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0

  • SHA512

    281de7039de2e6f984ee7981b62df7445c22dc30d3622cfd348cfe58ecd4db8f8dde874559420ab7475de498356ce404eb94c6938cd9a3076103171a326b0a65

  • SSDEEP

    12288:tAGala1a8LVerIZs2B55WmpYshXZPbGwidNpgA:t8a1aKer0s2B55WmD9idNpr

Score
10/10

Malware Config

Extracted

Family

spynote

C2

192.168.1.21:5425

Targets

    • Target

      595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0.bin

    • Size

      750KB

    • MD5

      e7969507b6db67d08d6c319273ea94af

    • SHA1

      42273f9cdf9c52d3ac852e8ae4fee56ec8504559

    • SHA256

      595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0

    • SHA512

      281de7039de2e6f984ee7981b62df7445c22dc30d3622cfd348cfe58ecd4db8f8dde874559420ab7475de498356ce404eb94c6938cd9a3076103171a326b0a65

    • SSDEEP

      12288:tAGala1a8LVerIZs2B55WmpYshXZPbGwidNpgA:t8a1aKer0s2B55WmD9idNpr

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks