General

  • Target

    f5809953daffb3efceb964f965192b186fa7287de9bf0e516104edf88f60112e.bin

  • Size

    591KB

  • Sample

    240316-1xc8kafb45

  • MD5

    97e9a50af159c882cd0d1c93bc83600a

  • SHA1

    d9b7a0fdba7b93d74cb6be209c65f0ff0142bb4e

  • SHA256

    f5809953daffb3efceb964f965192b186fa7287de9bf0e516104edf88f60112e

  • SHA512

    bc7cca3a03abeb9b734dcf208e2feef4a2fca5333abe018413571caec10da9b91bed6ac62d0974dc2d354eac30585f541fb0b14c0bb66cf9a5669f651dac0852

  • SSDEEP

    12288:8l9Z4sOp9wKqjKgIGQ1d4sT+Z/5/GepwaD5QbdADFb0BzUc:8LZdsa9Kldwpf/GepdabOI

Malware Config

Extracted

Family

spynote

C2

127.0.0.1:4444

Targets

    • Target

      f5809953daffb3efceb964f965192b186fa7287de9bf0e516104edf88f60112e.bin

    • Size

      591KB

    • MD5

      97e9a50af159c882cd0d1c93bc83600a

    • SHA1

      d9b7a0fdba7b93d74cb6be209c65f0ff0142bb4e

    • SHA256

      f5809953daffb3efceb964f965192b186fa7287de9bf0e516104edf88f60112e

    • SHA512

      bc7cca3a03abeb9b734dcf208e2feef4a2fca5333abe018413571caec10da9b91bed6ac62d0974dc2d354eac30585f541fb0b14c0bb66cf9a5669f651dac0852

    • SSDEEP

      12288:8l9Z4sOp9wKqjKgIGQ1d4sT+Z/5/GepwaD5QbdADFb0BzUc:8LZdsa9Kldwpf/GepdabOI

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks