General

  • Target

    d87c6b345d356b51f3c3e3b996517948335703e640e3e2f083d7270570bda59b.bin

  • Size

    756KB

  • Sample

    240306-1wnmxaaf68

  • MD5

    70f4935c02865fbbd0566430ea916720

  • SHA1

    114d102827e3ac6f7570e3648e411341fe67f928

  • SHA256

    d87c6b345d356b51f3c3e3b996517948335703e640e3e2f083d7270570bda59b

  • SHA512

    047171a87ac13bbaf4684b6bdb335946e60dbf1436e59babf73e1f3cdf8e9fdc92453815abe05d04957159715d36da30966f150a45a4ae39e3d34d8bf76933b2

  • SSDEEP

    12288:AnsC2a1a8LreZp62yJjPf5WmpYshXZPbGwidNpgp:AnN2a1a2eZpVyJjPf5WmD9idNpi

Malware Config

Extracted

Family

spynote

C2

droid.sytes.net:5214

Targets

    • Target

      d87c6b345d356b51f3c3e3b996517948335703e640e3e2f083d7270570bda59b.bin

    • Size

      756KB

    • MD5

      70f4935c02865fbbd0566430ea916720

    • SHA1

      114d102827e3ac6f7570e3648e411341fe67f928

    • SHA256

      d87c6b345d356b51f3c3e3b996517948335703e640e3e2f083d7270570bda59b

    • SHA512

      047171a87ac13bbaf4684b6bdb335946e60dbf1436e59babf73e1f3cdf8e9fdc92453815abe05d04957159715d36da30966f150a45a4ae39e3d34d8bf76933b2

    • SSDEEP

      12288:AnsC2a1a8LreZp62yJjPf5WmpYshXZPbGwidNpgp:AnN2a1a2eZpVyJjPf5WmD9idNpi

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks