General

  • Target

    e3273a54f72486c2937b52cfcc87331fb5324db75b2c29e7fa13bf420bd82061.bin

  • Size

    591KB

  • Sample

    240222-1ypyraff4w

  • MD5

    40723ea13ff46a78f7b122fdee2803fd

  • SHA1

    372bc8d61c56bde9a9ab6545121aafc707e28f50

  • SHA256

    e3273a54f72486c2937b52cfcc87331fb5324db75b2c29e7fa13bf420bd82061

  • SHA512

    791577c6a12e1e2f25620f773329279dcab4344e4034999e8c9ff8f2cd8b65f5bc372a28c83eea4c069ee1061530c1d94d0315a5b8865e562c7fb1df4e91025a

  • SSDEEP

    12288:W5AAvIq/R4Mb28zqU9ulzqN437UlbCaXlXNBdZ:kPvgMJuUglzqNI2bvlZ

Malware Config

Extracted

Family

spynote

C2

192.168.1.120:4444

Targets

    • Target

      e3273a54f72486c2937b52cfcc87331fb5324db75b2c29e7fa13bf420bd82061.bin

    • Size

      591KB

    • MD5

      40723ea13ff46a78f7b122fdee2803fd

    • SHA1

      372bc8d61c56bde9a9ab6545121aafc707e28f50

    • SHA256

      e3273a54f72486c2937b52cfcc87331fb5324db75b2c29e7fa13bf420bd82061

    • SHA512

      791577c6a12e1e2f25620f773329279dcab4344e4034999e8c9ff8f2cd8b65f5bc372a28c83eea4c069ee1061530c1d94d0315a5b8865e562c7fb1df4e91025a

    • SSDEEP

      12288:W5AAvIq/R4Mb28zqU9ulzqN437UlbCaXlXNBdZ:kPvgMJuUglzqNI2bvlZ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

MITRE ATT&CK Matrix

Tasks