General

  • Target

    ae2aadfea5e8c8e257703a864acf22c6059503ef3c60236d3f541adcc920c444.bin

  • Size

    760KB

  • Sample

    240523-1y2ybaaf4z

  • MD5

    32fb43c307464af56a48546fda79d4bc

  • SHA1

    227e64a8f3c75a9b6e9145d10f2289f2e123ae1f

  • SHA256

    ae2aadfea5e8c8e257703a864acf22c6059503ef3c60236d3f541adcc920c444

  • SHA512

    92bc96aa940c5db78f05911fc20f0b66dc4834abf6819884a13dc3d21e60a9a53d5c07ec065bdb4fd25b5118496ecbf7d3aed901cd11aba2c7e52e8a0c17bfda

  • SSDEEP

    12288:VDrMa1a8Lred3RAbOsNR5WmpYshXZPbGwidNpgE0c:VUa1a2edubOsNR5WmD9idNp30c

Malware Config

Extracted

Family

spynote

C2

136.244.85.140:5214

Targets

    • Target

      ae2aadfea5e8c8e257703a864acf22c6059503ef3c60236d3f541adcc920c444.bin

    • Size

      760KB

    • MD5

      32fb43c307464af56a48546fda79d4bc

    • SHA1

      227e64a8f3c75a9b6e9145d10f2289f2e123ae1f

    • SHA256

      ae2aadfea5e8c8e257703a864acf22c6059503ef3c60236d3f541adcc920c444

    • SHA512

      92bc96aa940c5db78f05911fc20f0b66dc4834abf6819884a13dc3d21e60a9a53d5c07ec065bdb4fd25b5118496ecbf7d3aed901cd11aba2c7e52e8a0c17bfda

    • SSDEEP

      12288:VDrMa1a8Lred3RAbOsNR5WmpYshXZPbGwidNpgE0c:VUa1a2edubOsNR5WmD9idNp30c

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks