General

  • Target

    5b7f3a88d0776a4edde90847c76b583da8f90db717f94a341697cea5f48edaa2.bin

  • Size

    760KB

  • Sample

    240407-1xljyaga23

  • MD5

    7899935b847a98f8540bbb936b62e836

  • SHA1

    cf7689411da21099adc31e92b4950f9793f6213d

  • SHA256

    5b7f3a88d0776a4edde90847c76b583da8f90db717f94a341697cea5f48edaa2

  • SHA512

    a27f934da8b258d740a8e1e0944986f7a67d5ae3efae5366ea62a6510e5dabb382a65d24111242fb503a3c43ddc59509673762b2d5c4fe4d25ec87238a2c48bb

  • SSDEEP

    12288:G/3dCYa1a8Lze4bqheoDzj5WmpYshXZPbGwidNpgha:G/3Na1ame4WeSzj5WmD9idNp7

Malware Config

Extracted

Family

spynote

C2

liveroman228-26531.portmap.host:26531

Targets

    • Target

      5b7f3a88d0776a4edde90847c76b583da8f90db717f94a341697cea5f48edaa2.bin

    • Size

      760KB

    • MD5

      7899935b847a98f8540bbb936b62e836

    • SHA1

      cf7689411da21099adc31e92b4950f9793f6213d

    • SHA256

      5b7f3a88d0776a4edde90847c76b583da8f90db717f94a341697cea5f48edaa2

    • SHA512

      a27f934da8b258d740a8e1e0944986f7a67d5ae3efae5366ea62a6510e5dabb382a65d24111242fb503a3c43ddc59509673762b2d5c4fe4d25ec87238a2c48bb

    • SSDEEP

      12288:G/3dCYa1a8Lze4bqheoDzj5WmpYshXZPbGwidNpgha:G/3Na1ame4WeSzj5WmD9idNp7

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks