General

  • Target

    de990b9df44a0b1b99f60f9ba6b32f63327b9b55e77805a9fb3081418190b63e.bin

  • Size

    760KB

  • Sample

    240219-1zmvsaec8x

  • MD5

    6ed133a33448505269e0b0390b3682b2

  • SHA1

    2e48b0b03091dd82c3aa2e9136ecc0d20789329b

  • SHA256

    de990b9df44a0b1b99f60f9ba6b32f63327b9b55e77805a9fb3081418190b63e

  • SHA512

    85e34f0b280c5d24366f6cbada3795aa986b4f3969d44f2ba8827bee471f3526b4fa80f1ea4f0e657ccbdcf9161fcf4de0a12351a9ea515a00921ea8bd4ea393

  • SSDEEP

    12288:lC42BZRvS0qMqfviYe5WmpYshXZPbGwidNpgW:lABZRrqMcviYe5WmD9idNpx

Malware Config

Extracted

Family

spynote

C2

147.185.221.18:38221

Targets

    • Target

      de990b9df44a0b1b99f60f9ba6b32f63327b9b55e77805a9fb3081418190b63e.bin

    • Size

      760KB

    • MD5

      6ed133a33448505269e0b0390b3682b2

    • SHA1

      2e48b0b03091dd82c3aa2e9136ecc0d20789329b

    • SHA256

      de990b9df44a0b1b99f60f9ba6b32f63327b9b55e77805a9fb3081418190b63e

    • SHA512

      85e34f0b280c5d24366f6cbada3795aa986b4f3969d44f2ba8827bee471f3526b4fa80f1ea4f0e657ccbdcf9161fcf4de0a12351a9ea515a00921ea8bd4ea393

    • SSDEEP

      12288:lC42BZRvS0qMqfviYe5WmpYshXZPbGwidNpgW:lABZRrqMcviYe5WmD9idNpx

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

MITRE ATT&CK Matrix

Tasks