General

  • Target

    c0d0f7fc34e92f3691974816937eda13b55a107ec2040bb74c7e40db4fcfcaac.bin

  • Size

    760KB

  • Sample

    240217-1zse9sbc31

  • MD5

    3e9d616ced42716b60fdb8848dd36dce

  • SHA1

    bc22e9f1d46a875b3492ed739fca981cb5c96b45

  • SHA256

    c0d0f7fc34e92f3691974816937eda13b55a107ec2040bb74c7e40db4fcfcaac

  • SHA512

    f66b7ce3b6dfa1b270e45f08fc2ccc00cac83110e4d4c834af1124c7069903354e7f08d7ec32b22df0eef9c73327d2ef196ebd2eadfe00643fdd2e2311e38675

  • SSDEEP

    12288:orcBoJ6sgR8LzypwCapX3v5WmpYshXZPbGwidNpgHL:o3J6stLzylad3v5WmD9idNpUL

Malware Config

Extracted

Family

spynote

C2

147.185.221.18:35308

Targets

    • Target

      c0d0f7fc34e92f3691974816937eda13b55a107ec2040bb74c7e40db4fcfcaac.bin

    • Size

      760KB

    • MD5

      3e9d616ced42716b60fdb8848dd36dce

    • SHA1

      bc22e9f1d46a875b3492ed739fca981cb5c96b45

    • SHA256

      c0d0f7fc34e92f3691974816937eda13b55a107ec2040bb74c7e40db4fcfcaac

    • SHA512

      f66b7ce3b6dfa1b270e45f08fc2ccc00cac83110e4d4c834af1124c7069903354e7f08d7ec32b22df0eef9c73327d2ef196ebd2eadfe00643fdd2e2311e38675

    • SSDEEP

      12288:orcBoJ6sgR8LzypwCapX3v5WmpYshXZPbGwidNpgHL:o3J6stLzylad3v5WmD9idNpUL

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

MITRE ATT&CK Matrix

Tasks