General

  • Target

    a0f78672495d8858c42f99336469ccf1e25eaa47ac3ef1c500016d5d6055d65f.bin

  • Size

    760KB

  • Sample

    240221-1zt9vsga2y

  • MD5

    899ca67f1e7136727e48c406caf8a9c0

  • SHA1

    eba44931f3ba1d6670f8e0b9ef39cedf278987b2

  • SHA256

    a0f78672495d8858c42f99336469ccf1e25eaa47ac3ef1c500016d5d6055d65f

  • SHA512

    b347c6e1e845eadecdeb28ce9f95bcebb3c7fcf5e6861f827dbd3ea6b1f031f476697eef2af0c3a847dd126da2fe9118e2e390a256d48e9d2fe766f8ecd5a6d8

  • SSDEEP

    12288:VVYOj0KJ6sgR8LzPBHiFuv+Q5WmpYshXZPbGwidNpgIl:VVYEJ6stLzPgFm+Q5WmD9idNpr

Malware Config

Extracted

Family

spynote

C2

bar-lemon.gl.at.ply.gg:40167

Targets

    • Target

      a0f78672495d8858c42f99336469ccf1e25eaa47ac3ef1c500016d5d6055d65f.bin

    • Size

      760KB

    • MD5

      899ca67f1e7136727e48c406caf8a9c0

    • SHA1

      eba44931f3ba1d6670f8e0b9ef39cedf278987b2

    • SHA256

      a0f78672495d8858c42f99336469ccf1e25eaa47ac3ef1c500016d5d6055d65f

    • SHA512

      b347c6e1e845eadecdeb28ce9f95bcebb3c7fcf5e6861f827dbd3ea6b1f031f476697eef2af0c3a847dd126da2fe9118e2e390a256d48e9d2fe766f8ecd5a6d8

    • SSDEEP

      12288:VVYOj0KJ6sgR8LzPBHiFuv+Q5WmpYshXZPbGwidNpgIl:VVYEJ6stLzPgFm+Q5WmD9idNpr

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

MITRE ATT&CK Matrix

Tasks