General

  • Target

    8ecd6e52ca451b691971ed5e0970f24601ab565813d80b00591bfd0f3f91d1e6.bin

  • Size

    836KB

  • Sample

    240229-1ydwgsec26

  • MD5

    9281dfeefe5bbe6ca05245f106db4d04

  • SHA1

    69486b754c16240254ce214734d3f6769ebc536c

  • SHA256

    8ecd6e52ca451b691971ed5e0970f24601ab565813d80b00591bfd0f3f91d1e6

  • SHA512

    d02d373650773ed6754f7233efd65985d385cff6b20c95474cfd24789fb03556a4d2340d61e39c1f51c49130cafc030a5e6001f3bc282b4b12bcd48655cbd84f

  • SSDEEP

    12288:nk0Qa1a8LdeJmsylIXxEBIRSbtFhp65WmpYshXZPbGwidNpgWc:nkZa1a6er8IhEBsitFhp65WmD9idNpu

Malware Config

Extracted

Family

spynote

C2

2.tcp.eu.ngrok.io:10861

Targets

    • Target

      8ecd6e52ca451b691971ed5e0970f24601ab565813d80b00591bfd0f3f91d1e6.bin

    • Size

      836KB

    • MD5

      9281dfeefe5bbe6ca05245f106db4d04

    • SHA1

      69486b754c16240254ce214734d3f6769ebc536c

    • SHA256

      8ecd6e52ca451b691971ed5e0970f24601ab565813d80b00591bfd0f3f91d1e6

    • SHA512

      d02d373650773ed6754f7233efd65985d385cff6b20c95474cfd24789fb03556a4d2340d61e39c1f51c49130cafc030a5e6001f3bc282b4b12bcd48655cbd84f

    • SSDEEP

      12288:nk0Qa1a8LdeJmsylIXxEBIRSbtFhp65WmpYshXZPbGwidNpgWc:nkZa1a6er8IhEBsitFhp65WmD9idNpu

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks