General

  • Target

    88646f3e3935d0b617059aaa9b4b4076d29d86aae524a107273d7d93b0d99f52.bin

  • Size

    775KB

  • Sample

    240218-1ya5lafd52

  • MD5

    69fb688e8ccce0cee812c5dedfa6c8f2

  • SHA1

    6a650c8965e6500df827cd7866b4ad30f9fbabe7

  • SHA256

    88646f3e3935d0b617059aaa9b4b4076d29d86aae524a107273d7d93b0d99f52

  • SHA512

    81ef781f1546d028a8d1e2368b7b0c66ba2636cc304fcdc71b2ee89f8a607ca6a87713a299fd4bee5c42bee772ffd8a74df1ec57f6dc5a58600731320c7efd74

  • SSDEEP

    12288:+k2NAHua1a8Ldesw66fhMLFf5WmpYshXZPbGwidNpgi:tlOa1a6eswRfhML55WmD9idNpp

Score
10/10

Malware Config

Extracted

Family

spynote

C2

az.lxkj.vip:41158

Targets

    • Target

      88646f3e3935d0b617059aaa9b4b4076d29d86aae524a107273d7d93b0d99f52.bin

    • Size

      775KB

    • MD5

      69fb688e8ccce0cee812c5dedfa6c8f2

    • SHA1

      6a650c8965e6500df827cd7866b4ad30f9fbabe7

    • SHA256

      88646f3e3935d0b617059aaa9b4b4076d29d86aae524a107273d7d93b0d99f52

    • SHA512

      81ef781f1546d028a8d1e2368b7b0c66ba2636cc304fcdc71b2ee89f8a607ca6a87713a299fd4bee5c42bee772ffd8a74df1ec57f6dc5a58600731320c7efd74

    • SSDEEP

      12288:+k2NAHua1a8Ldesw66fhMLFf5WmpYshXZPbGwidNpgi:tlOa1a6eswRfhML55WmD9idNpp

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks