General

  • Target

    0c673104d8fdd138f206ed9195b2b9dc286ab44cb16e2ce22c1c3ab493011bd6.bin

  • Size

    760KB

  • Sample

    240227-1xvgvacf8w

  • MD5

    4d9f21e15fb56f88724facfb1bfe494d

  • SHA1

    854a83e934a3214ba49fef86f208639968a9ce8c

  • SHA256

    0c673104d8fdd138f206ed9195b2b9dc286ab44cb16e2ce22c1c3ab493011bd6

  • SHA512

    6ae177139e6f8695b8b798ef6fe70f1e937d0c078e0df2572bbc5fa3f94b57057a0c1a5e5f272dff7d06fa2f81544ff4675c902b823fa9063cd52221d9e19705

  • SSDEEP

    12288:9YsOa1a8LzegPLqHG9Pn5WmpYshXZPbGwidNpgAC:9ma1amegsG9Pn5WmD9idNpu

Malware Config

Extracted

Family

spynote

C2

crackerdz.loseyourip.com:1155

Targets

    • Target

      0c673104d8fdd138f206ed9195b2b9dc286ab44cb16e2ce22c1c3ab493011bd6.bin

    • Size

      760KB

    • MD5

      4d9f21e15fb56f88724facfb1bfe494d

    • SHA1

      854a83e934a3214ba49fef86f208639968a9ce8c

    • SHA256

      0c673104d8fdd138f206ed9195b2b9dc286ab44cb16e2ce22c1c3ab493011bd6

    • SHA512

      6ae177139e6f8695b8b798ef6fe70f1e937d0c078e0df2572bbc5fa3f94b57057a0c1a5e5f272dff7d06fa2f81544ff4675c902b823fa9063cd52221d9e19705

    • SSDEEP

      12288:9YsOa1a8LzegPLqHG9Pn5WmpYshXZPbGwidNpgAC:9ma1amegsG9Pn5WmD9idNpu

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks