General

  • Target

    6f243a692e030403fdc88dd60836e5318f13780f35c8495bf81f83a2fba3c3e5.bin

  • Size

    764KB

  • Sample

    240224-1w96xafe27

  • MD5

    6eda8d74cd5397201d7614498cb3aadb

  • SHA1

    b71416446a012d64f3480129f9dba2d8c367d76c

  • SHA256

    6f243a692e030403fdc88dd60836e5318f13780f35c8495bf81f83a2fba3c3e5

  • SHA512

    c03f46afd0f28d635a01a9ed6abf394c42db716a8eb02500cd4d0becc773fe51b5ec0c022ef9641cba655d66141fa6b76ad8e9b0b8b8fa30cfbff2b48416cc03

  • SSDEEP

    12288:TsZmRGkBX0yh2+x6FQJIYSNgmwpfUl/M+PRgJP1j0jVZ2s:TsZmJSywW6KWYSNgmaUrRgJPmjVZ2s

Malware Config

Extracted

Family

spynote

C2

agam65.ddns.net:22

Targets

    • Target

      6f243a692e030403fdc88dd60836e5318f13780f35c8495bf81f83a2fba3c3e5.bin

    • Size

      764KB

    • MD5

      6eda8d74cd5397201d7614498cb3aadb

    • SHA1

      b71416446a012d64f3480129f9dba2d8c367d76c

    • SHA256

      6f243a692e030403fdc88dd60836e5318f13780f35c8495bf81f83a2fba3c3e5

    • SHA512

      c03f46afd0f28d635a01a9ed6abf394c42db716a8eb02500cd4d0becc773fe51b5ec0c022ef9641cba655d66141fa6b76ad8e9b0b8b8fa30cfbff2b48416cc03

    • SSDEEP

      12288:TsZmRGkBX0yh2+x6FQJIYSNgmwpfUl/M+PRgJP1j0jVZ2s:TsZmJSywW6KWYSNgmaUrRgJPmjVZ2s

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks