General

  • Target

    20145891698.zip

  • Size

    5.3MB

  • Sample

    241203-p5386s1qel

  • MD5

    8c5896bf736a69d76f0cf756c79d2233

  • SHA1

    e6507976d3d3512b4203387ed9cb292a7161ec37

  • SHA256

    ea7b0feda556abd530a52fee4efef53ebcc0cb5beec358bf4d8a3ecd3d002036

  • SHA512

    0aa652694c402d8a600db4246b5108f113cbb8703710f86889d7f39320091eaedb9643432bcc8b0d23757cddbc5fc2039d375521b5a081b2e4a7b71c6395a498

  • SSDEEP

    98304:e5ExV4W3FQ7OVCcU6v1vg3fc8/0DmVb7G+IgxZaBcbK6J2dzta6NeZZeQi1ZptW5:aExV4PgCh6v14cwzJyLgxZaB0K6JsZJ0

Malware Config

Extracted

Family

spynote

C2

1.tcp.ngrok.io:26423

Targets

    • Target

      96c00e172d4052285950f64a329efb32365fc3e93b5535a84ddfcc715aff5618

    • Size

      5.3MB

    • MD5

      39bdbdf74aa19384e2188763162096b0

    • SHA1

      baffba739efa0f36b820445a20dfaccc9e3ac4f9

    • SHA256

      96c00e172d4052285950f64a329efb32365fc3e93b5535a84ddfcc715aff5618

    • SHA512

      9170a7f2aa4b57e1d0795c7e8caacb34e03fb08817c6f8e0ca547f2dc93991ccc94bb07f68c28bf63a33d10ae9bbc50776fece66b646edf1ce3538254f99c49c

    • SSDEEP

      98304:/LI2MRcJI0G58SuyXdYaTHf/Yuezen31F2GcXKfZOyXCf8PdvQ:/LqRw/G2stHTHf/ezqz2GcXHyXWAQ

    • Spynote

      Spynote is a Remote Access Trojan first seen in 2017.

    • Spynote family

    • Spynote payload

    • Declares broadcast receivers with permission to handle system events

    • Declares services with permission to bind to the system

    • Legitimate hosting services abused for malware hosting/C2

    • Requests dangerous framework permissions

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v15

Tasks