General

  • Target

    1eda76d0de423c9b5da8090fc0d5fe881d4ef8ee57160f2b0317130b958737c6.bin

  • Size

    744KB

  • Sample

    240229-1wyswadg2y

  • MD5

    8ce1e12b7cff30516cb00330daa10e7d

  • SHA1

    653a6711682191fa649dbbb9b22d42d37a0be343

  • SHA256

    1eda76d0de423c9b5da8090fc0d5fe881d4ef8ee57160f2b0317130b958737c6

  • SHA512

    1c199e6efd18ac37ed68086f278507f4c4f8cfb3f6784d48c6070b9b2963cf46e85213ab7956d6c9dd34421d0116a03e999712289e009ddbff3567bbf5e5394a

  • SSDEEP

    12288:usZmRGkBX0yh2+x6FQhl0atESsJrdggJP1jjXaLtFB2:usZmJSywW6KX0atESqygJPVXaZv2

Malware Config

Extracted

Family

spynote

C2

147.185.221.18:38221

Targets

    • Target

      1eda76d0de423c9b5da8090fc0d5fe881d4ef8ee57160f2b0317130b958737c6.bin

    • Size

      744KB

    • MD5

      8ce1e12b7cff30516cb00330daa10e7d

    • SHA1

      653a6711682191fa649dbbb9b22d42d37a0be343

    • SHA256

      1eda76d0de423c9b5da8090fc0d5fe881d4ef8ee57160f2b0317130b958737c6

    • SHA512

      1c199e6efd18ac37ed68086f278507f4c4f8cfb3f6784d48c6070b9b2963cf46e85213ab7956d6c9dd34421d0116a03e999712289e009ddbff3567bbf5e5394a

    • SSDEEP

      12288:usZmRGkBX0yh2+x6FQhl0atESsJrdggJP1jjXaLtFB2:usZmJSywW6KX0atESqygJPVXaZv2

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

MITRE ATT&CK Matrix

Tasks