General

  • Target

    4205472e5107adf9c45c015f3b1e7946d5ba9c017009c9ae0a6709112edb0c15.bin

  • Size

    760KB

  • Sample

    240401-1xnpasgh76

  • MD5

    0b8e632b6f77e187537a0587931d3821

  • SHA1

    ff529896e5891d7466235af347bbbb9d8ce071ce

  • SHA256

    4205472e5107adf9c45c015f3b1e7946d5ba9c017009c9ae0a6709112edb0c15

  • SHA512

    c8d451ca23ee44d5dc1ee9e4adb81b71b06cf505714678831df9edc3f1ca19fa7adcf27890b7119fdf8b221f543e52c9533ec5ffdc03036f679e2410ca7a9dfd

  • SSDEEP

    12288:DuZF6ra1a8LVed3UB0M7uxB5WmpYshXZPbGwidNpgE:DuZF6a1aKedg0GuxB5WmD9idNpn

Malware Config

Extracted

Family

spynote

C2

192.168.226.140:9999

Targets

    • Target

      4205472e5107adf9c45c015f3b1e7946d5ba9c017009c9ae0a6709112edb0c15.bin

    • Size

      760KB

    • MD5

      0b8e632b6f77e187537a0587931d3821

    • SHA1

      ff529896e5891d7466235af347bbbb9d8ce071ce

    • SHA256

      4205472e5107adf9c45c015f3b1e7946d5ba9c017009c9ae0a6709112edb0c15

    • SHA512

      c8d451ca23ee44d5dc1ee9e4adb81b71b06cf505714678831df9edc3f1ca19fa7adcf27890b7119fdf8b221f543e52c9533ec5ffdc03036f679e2410ca7a9dfd

    • SSDEEP

      12288:DuZF6ra1a8LVed3UB0M7uxB5WmpYshXZPbGwidNpgE:DuZF6a1aKedg0GuxB5WmD9idNpn

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Matrix

Tasks