General

  • Target

    7364de984687b4483ff4a0c8893c951b2cddc76eeae4ca975a19f685f95604ac.bin

  • Size

    760KB

  • Sample

    240221-1x7geagd69

  • MD5

    6a6bb41954aed74225f8b6117db39d9e

  • SHA1

    4337b689c4656996d78998ad37c6d42f936f3435

  • SHA256

    7364de984687b4483ff4a0c8893c951b2cddc76eeae4ca975a19f685f95604ac

  • SHA512

    5bb3cc7e3cffce2b22f4d30ca45ff77a30d57ab130a39d10ef0ded02f490993ac4c393ab02f37c6b569b45510aa96536588367daf5f5bf29bdfcbb55765d03ff

  • SSDEEP

    12288:2pmhDa1a8LVewleAoZdt5WmpYshXZPbGwidNpgU:2pGa1aKewhoZdt5WmD9idNpT

Score
10/10

Malware Config

Extracted

Family

spynote

C2

192.168.0.27:1177

Targets

    • Target

      7364de984687b4483ff4a0c8893c951b2cddc76eeae4ca975a19f685f95604ac.bin

    • Size

      760KB

    • MD5

      6a6bb41954aed74225f8b6117db39d9e

    • SHA1

      4337b689c4656996d78998ad37c6d42f936f3435

    • SHA256

      7364de984687b4483ff4a0c8893c951b2cddc76eeae4ca975a19f685f95604ac

    • SHA512

      5bb3cc7e3cffce2b22f4d30ca45ff77a30d57ab130a39d10ef0ded02f490993ac4c393ab02f37c6b569b45510aa96536588367daf5f5bf29bdfcbb55765d03ff

    • SSDEEP

      12288:2pmhDa1a8LVewleAoZdt5WmpYshXZPbGwidNpgU:2pGa1aKewhoZdt5WmD9idNpT

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks