General

  • Target

    860172f83b762866558c753af804f76f9eb8fcfa979d4b5c6e88954bf2e268c3.bin

  • Size

    779KB

  • Sample

    240531-16d68agc23

  • MD5

    246e4259ddbba09ea3c6478264eb4f23

  • SHA1

    57e497bd89361788a2a23249a231948f06bcc6a9

  • SHA256

    860172f83b762866558c753af804f76f9eb8fcfa979d4b5c6e88954bf2e268c3

  • SHA512

    fe57d7f6c0f57742e29580ba7bcf4523f17112c9752f73be7211e3bb9f0d79fd56f21571c1c0412af079cdb94cf7e2688d928c29bf4f9f634885f63eac418fa6

  • SSDEEP

    12288:gFVa1a8LVee/p6ZYbKA89F5WmpYshXZPbGwidNpgeI:gna1aKee/oZYbKj9F5WmD9idNpLI

Malware Config

Extracted

Family

spynote

C2

192.168.1.6:5555

Targets

    • Target

      860172f83b762866558c753af804f76f9eb8fcfa979d4b5c6e88954bf2e268c3.bin

    • Size

      779KB

    • MD5

      246e4259ddbba09ea3c6478264eb4f23

    • SHA1

      57e497bd89361788a2a23249a231948f06bcc6a9

    • SHA256

      860172f83b762866558c753af804f76f9eb8fcfa979d4b5c6e88954bf2e268c3

    • SHA512

      fe57d7f6c0f57742e29580ba7bcf4523f17112c9752f73be7211e3bb9f0d79fd56f21571c1c0412af079cdb94cf7e2688d928c29bf4f9f634885f63eac418fa6

    • SSDEEP

      12288:gFVa1a8LVee/p6ZYbKA89F5WmpYshXZPbGwidNpgeI:gna1aKee/oZYbKj9F5WmD9idNpLI

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks