General

  • Target

    7c9e5eee632c69ff8a4bb12191d1052cde79d492e04f76c0cccd6eaa4bb28390.bin

  • Size

    912KB

  • Sample

    240219-1zlbyseh67

  • MD5

    a934b538e10fe71029ffec9747960c4c

  • SHA1

    9ae8209e17c83e8bc43954593a997010ca5d8404

  • SHA256

    7c9e5eee632c69ff8a4bb12191d1052cde79d492e04f76c0cccd6eaa4bb28390

  • SHA512

    03e269153f34a9c16c035c1630c44818c6d5d61f85a41733aea18542a1c8098e1a935da057c8262088b79cfe92cae0f58a323cf47b743e0181216e03c4b39bd6

  • SSDEEP

    12288:iMlBZRvS0qkMgQMhDv8MECQMArrrLgamviiQmxCdgbx3BIIg:TlBZRrqdgxRvlECxirfRiXQdgbxxIf

Malware Config

Extracted

Family

spynote

C2

147.185.221.18:38221

Targets

    • Target

      7c9e5eee632c69ff8a4bb12191d1052cde79d492e04f76c0cccd6eaa4bb28390.bin

    • Size

      912KB

    • MD5

      a934b538e10fe71029ffec9747960c4c

    • SHA1

      9ae8209e17c83e8bc43954593a997010ca5d8404

    • SHA256

      7c9e5eee632c69ff8a4bb12191d1052cde79d492e04f76c0cccd6eaa4bb28390

    • SHA512

      03e269153f34a9c16c035c1630c44818c6d5d61f85a41733aea18542a1c8098e1a935da057c8262088b79cfe92cae0f58a323cf47b743e0181216e03c4b39bd6

    • SSDEEP

      12288:iMlBZRvS0qkMgQMhDv8MECQMArrrLgamviiQmxCdgbx3BIIg:TlBZRrqdgxRvlECxirfRiXQdgbxxIf

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

MITRE ATT&CK Matrix

Tasks