General

  • Target

    88654e4ba373b42b8167f2006d9c642f6f6e14cbc478154fb48990b7260c3625.bin

  • Size

    760KB

  • Sample

    240222-1yqv2sga73

  • MD5

    9c4feebbceb74595d62981faaab3ec70

  • SHA1

    a8d2339ca6a9ea280d7d7dd9f0eaf6a8c88a8f3f

  • SHA256

    88654e4ba373b42b8167f2006d9c642f6f6e14cbc478154fb48990b7260c3625

  • SHA512

    d36833803bbfc76180ecd3fad75453b9aeebdb8a6a32ab5d3eae4feef76358d0fde2b0b87c91a8d9c555c49c7855fc1874b2d72eb871b4dbd67bfe2dfdb86848

  • SSDEEP

    12288:SQNPz8uPTa1a8LdestaUcJ78xZ5WmpYshXZPbGwidNpgQ:SQNPz8Ka1a6es5c58xZ5WmD9idNpD

Malware Config

Extracted

Family

spynote

C2

192.168.1.120:4444

Targets

    • Target

      88654e4ba373b42b8167f2006d9c642f6f6e14cbc478154fb48990b7260c3625.bin

    • Size

      760KB

    • MD5

      9c4feebbceb74595d62981faaab3ec70

    • SHA1

      a8d2339ca6a9ea280d7d7dd9f0eaf6a8c88a8f3f

    • SHA256

      88654e4ba373b42b8167f2006d9c642f6f6e14cbc478154fb48990b7260c3625

    • SHA512

      d36833803bbfc76180ecd3fad75453b9aeebdb8a6a32ab5d3eae4feef76358d0fde2b0b87c91a8d9c555c49c7855fc1874b2d72eb871b4dbd67bfe2dfdb86848

    • SSDEEP

      12288:SQNPz8uPTa1a8LdestaUcJ78xZ5WmpYshXZPbGwidNpgQ:SQNPz8Ka1a6es5c58xZ5WmD9idNpD

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

MITRE ATT&CK Matrix

Tasks