General

  • Target

    SpyNote_v6.4.rar

  • Size

    22.0MB

  • Sample

    241007-tnddmsterg

  • MD5

    84325e47432141d8440127bce6b974d0

  • SHA1

    3ffa30171e6d57af803b6fae0f8b35559bc45274

  • SHA256

    71ce71735aa47a3b1d17e1b6639aaf6213b4c284243ad5ae7bb36fa1c5c9975f

  • SHA512

    701f3573be8634d5a10d72935be0ae9a1929804e1f16634bc3ed104c1e863df14456a5b7ffb62a0c7612db506017ad672ed447ee6bd2dbf81af88caf840ae03e

  • SSDEEP

    393216:KTkHSGrRzx7bynxYnMHcBNvUqvvDY4gXX9w+ijU0UkL20tzPt/OGtgwGIR46mrn:KQHSqomnM8BNvnNga+KU0zp//RxmL

Malware Config

Extracted

Family

spynote

C2

[SPY_NOTE_HOST_OK]:[SPY_NOTE_PORT_OK]

Targets

    • Target

      SpyNote_v6.4.rar

    • Size

      22.0MB

    • MD5

      84325e47432141d8440127bce6b974d0

    • SHA1

      3ffa30171e6d57af803b6fae0f8b35559bc45274

    • SHA256

      71ce71735aa47a3b1d17e1b6639aaf6213b4c284243ad5ae7bb36fa1c5c9975f

    • SHA512

      701f3573be8634d5a10d72935be0ae9a1929804e1f16634bc3ed104c1e863df14456a5b7ffb62a0c7612db506017ad672ed447ee6bd2dbf81af88caf840ae03e

    • SSDEEP

      393216:KTkHSGrRzx7bynxYnMHcBNvUqvvDY4gXX9w+ijU0UkL20tzPt/OGtgwGIR46mrn:KQHSqomnM8BNvnNga+KU0zp//RxmL

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks