General

  • Target

    1919d21110a01df37e93f4b0a416b5f1f089505fda955bfe6b5acae6239b28f0.bin

  • Size

    760KB

  • Sample

    240531-23k12ahf69

  • MD5

    ca3dc0ad6eb90d3fab589d95a0945b08

  • SHA1

    5a83b53b5e270f57b7388979257dbbadb1be41f0

  • SHA256

    1919d21110a01df37e93f4b0a416b5f1f089505fda955bfe6b5acae6239b28f0

  • SHA512

    2bc12e03ac2c4d9705f37b79fdf4f5f58aefee29e4998f0a398fa9806b32941718c1ecee294ceaeacb1ae927915d0637d6869bd09eb0d9294463277efbb9e6b3

  • SSDEEP

    12288:yYSdXbujJ6sgRMLzGxASeUbrDn5WmpYshXZPbGwidNpgO:yYSdCJ6s9LzG1eUbrDn5WmD9idNpV

Malware Config

Extracted

Family

spynote

C2

192.168.1.6:5555

Targets

    • Target

      1919d21110a01df37e93f4b0a416b5f1f089505fda955bfe6b5acae6239b28f0.bin

    • Size

      760KB

    • MD5

      ca3dc0ad6eb90d3fab589d95a0945b08

    • SHA1

      5a83b53b5e270f57b7388979257dbbadb1be41f0

    • SHA256

      1919d21110a01df37e93f4b0a416b5f1f089505fda955bfe6b5acae6239b28f0

    • SHA512

      2bc12e03ac2c4d9705f37b79fdf4f5f58aefee29e4998f0a398fa9806b32941718c1ecee294ceaeacb1ae927915d0637d6869bd09eb0d9294463277efbb9e6b3

    • SSDEEP

      12288:yYSdXbujJ6sgRMLzGxASeUbrDn5WmpYshXZPbGwidNpgO:yYSdCJ6s9LzG1eUbrDn5WmD9idNpV

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks