General

  • Target

    709baa0e07c75946520da4923c2fa9ea01af0f06f8834cd317c5a2f71dd4994a.bin

  • Size

    760KB

  • Sample

    240224-1x6j4sgc7w

  • MD5

    772d62590a32cb04a2db4be8afec106c

  • SHA1

    f2443f644b5413326184d398e73c085c9679ef32

  • SHA256

    709baa0e07c75946520da4923c2fa9ea01af0f06f8834cd317c5a2f71dd4994a

  • SHA512

    02d0a8ce9aec8b50249b2995a11f867bfa239b9b0403e1395a88e85ca0e1133f2b5a2988541372f83e87d27df9f72590fe265ee72f86584ee476ac6566100205

  • SSDEEP

    12288:GV7J6sgRQLzErWz+Y4eB65WmpYshXZPbGwidNpg2tP:GBJ6sjLzEc+FeB65WmD9idNpZP

Malware Config

Extracted

Family

spynote

C2

function-reproduced.gl.at.ply.gg:5084

Targets

    • Target

      709baa0e07c75946520da4923c2fa9ea01af0f06f8834cd317c5a2f71dd4994a.bin

    • Size

      760KB

    • MD5

      772d62590a32cb04a2db4be8afec106c

    • SHA1

      f2443f644b5413326184d398e73c085c9679ef32

    • SHA256

      709baa0e07c75946520da4923c2fa9ea01af0f06f8834cd317c5a2f71dd4994a

    • SHA512

      02d0a8ce9aec8b50249b2995a11f867bfa239b9b0403e1395a88e85ca0e1133f2b5a2988541372f83e87d27df9f72590fe265ee72f86584ee476ac6566100205

    • SSDEEP

      12288:GV7J6sgRQLzErWz+Y4eB65WmpYshXZPbGwidNpg2tP:GBJ6sjLzEc+FeB65WmD9idNpZP

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Matrix

Tasks