General

  • Target

    120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775.bin

  • Size

    760KB

  • Sample

    240425-1xkmmsfg2x

  • MD5

    b7a546586dc2a6fbbad8add46dd0090a

  • SHA1

    2ec43ecfc9bb85aac8d22938fe54e5ac76a6a5a8

  • SHA256

    120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775

  • SHA512

    4ac5366f9e78fa0c3fd84c3542eca694c63ba6a63b8556837492b0ce69c202268f28fd39804a88e7a0bdce54ef43c0fbed4b20c7b3fe2eda5ad11b91675583b4

  • SSDEEP

    12288:aczMX5ia1a8LzeArGlOPvP5WmpYshXZPbGwidNpgn:aczMYa1ameAKOPvP5WmD9idNps

Malware Config

Extracted

Family

spynote

C2

192.168.1.6:4444

Targets

    • Target

      120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775.bin

    • Size

      760KB

    • MD5

      b7a546586dc2a6fbbad8add46dd0090a

    • SHA1

      2ec43ecfc9bb85aac8d22938fe54e5ac76a6a5a8

    • SHA256

      120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775

    • SHA512

      4ac5366f9e78fa0c3fd84c3542eca694c63ba6a63b8556837492b0ce69c202268f28fd39804a88e7a0bdce54ef43c0fbed4b20c7b3fe2eda5ad11b91675583b4

    • SSDEEP

      12288:aczMX5ia1a8LzeArGlOPvP5WmpYshXZPbGwidNpgn:aczMYa1ameAKOPvP5WmD9idNps

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks