General

  • Target

    950624f573a345116af34135aec1174b3cacf44635b89c3ea120273099bee4cd.bin

  • Size

    760KB

  • Sample

    240217-1zfrgabc3v

  • MD5

    132f182a0e6b654dbdd93d68a9f18ded

  • SHA1

    e69b0dabbe749c05c38200acd86ab0d45d48278f

  • SHA256

    950624f573a345116af34135aec1174b3cacf44635b89c3ea120273099bee4cd

  • SHA512

    dff45e75068e5e629abf2a34c9c6af1f465cdebeb5790c3f8c1c2d40501aec1d7f5672834d59153aa62b2c48a8003278821436bdd9484ccdb2e57ef31741c6a9

  • SSDEEP

    12288:rxCa1a8LzepYhYHlOIaQ5WmpYshXZPbGwidNpgCkW:rga1amepNHlOIaQ5WmD9idNppkW

Score
10/10

Malware Config

Extracted

Family

spynote

C2

192.168.100.120:4444

Targets

    • Target

      950624f573a345116af34135aec1174b3cacf44635b89c3ea120273099bee4cd.bin

    • Size

      760KB

    • MD5

      132f182a0e6b654dbdd93d68a9f18ded

    • SHA1

      e69b0dabbe749c05c38200acd86ab0d45d48278f

    • SHA256

      950624f573a345116af34135aec1174b3cacf44635b89c3ea120273099bee4cd

    • SHA512

      dff45e75068e5e629abf2a34c9c6af1f465cdebeb5790c3f8c1c2d40501aec1d7f5672834d59153aa62b2c48a8003278821436bdd9484ccdb2e57ef31741c6a9

    • SSDEEP

      12288:rxCa1a8LzepYhYHlOIaQ5WmpYshXZPbGwidNpgCkW:rga1amepNHlOIaQ5WmD9idNppkW

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks