General

  • Target

    4a4bd327638523a62b32ca0653df92fac17350c13ff4a2725684f156c2ea48f5.bin

  • Size

    822KB

  • Sample

    240430-1w649aae82

  • MD5

    8d45b7713223385ef29ebfb4e0895ceb

  • SHA1

    eaa82a306fe10b3c30bc3beaee8591c9ec111de3

  • SHA256

    4a4bd327638523a62b32ca0653df92fac17350c13ff4a2725684f156c2ea48f5

  • SHA512

    af8dd6f73d1a317332c9baa93e0d4e704799f8e016b90d87d2242e43c5a9b8c8937c9a787f88fe19aae667967635ef43ae5b3d1083a9e9c7acb5fcad558c4a60

  • SSDEEP

    12288:uYVa1a8LreKymDQyvQZB6/wjUA5WmpYshXZPbGwidNpg3P:da1a2esLvoQwjUA5WmD9idNpmP

Malware Config

Extracted

Family

spynote

C2

adelop33.ddns.net:14051

Targets

    • Target

      4a4bd327638523a62b32ca0653df92fac17350c13ff4a2725684f156c2ea48f5.bin

    • Size

      822KB

    • MD5

      8d45b7713223385ef29ebfb4e0895ceb

    • SHA1

      eaa82a306fe10b3c30bc3beaee8591c9ec111de3

    • SHA256

      4a4bd327638523a62b32ca0653df92fac17350c13ff4a2725684f156c2ea48f5

    • SHA512

      af8dd6f73d1a317332c9baa93e0d4e704799f8e016b90d87d2242e43c5a9b8c8937c9a787f88fe19aae667967635ef43ae5b3d1083a9e9c7acb5fcad558c4a60

    • SSDEEP

      12288:uYVa1a8LreKymDQyvQZB6/wjUA5WmpYshXZPbGwidNpg3P:da1a2esLvoQwjUA5WmD9idNpmP

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks