General

  • Target

    18efe0d657e78f3b7edc24adfc321d50433e19e98a0fa064543f9ed1fd16da73.bin

  • Size

    855KB

  • Sample

    240223-1xvslsaf7v

  • MD5

    a9df48edf4826467a183eb17027aa368

  • SHA1

    845d360872c68f506e78b5178c4d1afd41c5abb4

  • SHA256

    18efe0d657e78f3b7edc24adfc321d50433e19e98a0fa064543f9ed1fd16da73

  • SHA512

    e1968bd69596fd308f22ea7b50bd395ef50aa15a8e5a8d8e6a6417c97e290d68159d4024c45ebaf745a75bd6f779f4ba23f22bca64ec2df4240128faf731ad06

  • SSDEEP

    12288:Gi+a1a8LzebIiKRYfRH5YRc2KQ5WmpYshXZPbGwidNpg29:sa1ameciKsRH5Ic2KQ5WmD9idNp59

Malware Config

Extracted

Family

spynote

C2

0.tcp.eu.ngrok.io:12231

Targets

    • Target

      18efe0d657e78f3b7edc24adfc321d50433e19e98a0fa064543f9ed1fd16da73.bin

    • Size

      855KB

    • MD5

      a9df48edf4826467a183eb17027aa368

    • SHA1

      845d360872c68f506e78b5178c4d1afd41c5abb4

    • SHA256

      18efe0d657e78f3b7edc24adfc321d50433e19e98a0fa064543f9ed1fd16da73

    • SHA512

      e1968bd69596fd308f22ea7b50bd395ef50aa15a8e5a8d8e6a6417c97e290d68159d4024c45ebaf745a75bd6f779f4ba23f22bca64ec2df4240128faf731ad06

    • SSDEEP

      12288:Gi+a1a8LzebIiKRYfRH5YRc2KQ5WmpYshXZPbGwidNpg29:sa1ameciKsRH5Ic2KQ5WmD9idNp59

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks