General

  • Target

    94ab4c0da44d5b4a05acb983586c6b1e0e1fbc528bd3f33df317759d8d03ff2c.bin

  • Size

    760KB

  • Sample

    240227-1xcxssce85

  • MD5

    51414efef6663e29e7c9e17b85c5b189

  • SHA1

    dd0038c8d87027eadb71080f74877e203503572e

  • SHA256

    94ab4c0da44d5b4a05acb983586c6b1e0e1fbc528bd3f33df317759d8d03ff2c

  • SHA512

    ee2c89dc43d17e167f1b88129e77b1edcc5918fdc05ac7f39af16d20d200e607945e7ab9ab31b6c8987fd90f6d47bc1162037d911331da7f8268e4a6bd197bea

  • SSDEEP

    12288:FXsma1a8LVePnTPDkke5WmpYshXZPbGwidNpgj:F5a1aKePbDkke5WmD9idNpI

Malware Config

Extracted

Family

spynote

C2

0.tcp.eu.ngrok.io:14531

Targets

    • Target

      94ab4c0da44d5b4a05acb983586c6b1e0e1fbc528bd3f33df317759d8d03ff2c.bin

    • Size

      760KB

    • MD5

      51414efef6663e29e7c9e17b85c5b189

    • SHA1

      dd0038c8d87027eadb71080f74877e203503572e

    • SHA256

      94ab4c0da44d5b4a05acb983586c6b1e0e1fbc528bd3f33df317759d8d03ff2c

    • SHA512

      ee2c89dc43d17e167f1b88129e77b1edcc5918fdc05ac7f39af16d20d200e607945e7ab9ab31b6c8987fd90f6d47bc1162037d911331da7f8268e4a6bd197bea

    • SSDEEP

      12288:FXsma1a8LVePnTPDkke5WmpYshXZPbGwidNpgj:F5a1aKePbDkke5WmD9idNpI

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks