General

  • Target

    ba8823d9cb4ada3850b8d093a65236d45c7bd5ba881d6581ee2c6e9e534290f1.bin

  • Size

    735KB

  • Sample

    240702-11tdyssbqg

  • MD5

    db0be2e8bcc8adcd32a2ae4b4b6d7601

  • SHA1

    9fcbbe604ded77fd3c78c593432635f80f3d29d1

  • SHA256

    ba8823d9cb4ada3850b8d093a65236d45c7bd5ba881d6581ee2c6e9e534290f1

  • SHA512

    5b94dd377817881bddbb83f9e525a5a6ee6a7cdf854234aabf4662e743f83fad942913a457001d9b049567736f1cccaa6fb4ac8ccee61999fb7ff6a8ae37c396

  • SSDEEP

    12288:y9ubWZlxi2odwvi/RwncvOAxsOioBTTUXS1SgJP1jzqn2:y9ubsPgw6ucvbsOioBUNgJP5qn2

Malware Config

Extracted

Family

spynote

C2

147.185.221.20:51354

Targets

    • Target

      ba8823d9cb4ada3850b8d093a65236d45c7bd5ba881d6581ee2c6e9e534290f1.bin

    • Size

      735KB

    • MD5

      db0be2e8bcc8adcd32a2ae4b4b6d7601

    • SHA1

      9fcbbe604ded77fd3c78c593432635f80f3d29d1

    • SHA256

      ba8823d9cb4ada3850b8d093a65236d45c7bd5ba881d6581ee2c6e9e534290f1

    • SHA512

      5b94dd377817881bddbb83f9e525a5a6ee6a7cdf854234aabf4662e743f83fad942913a457001d9b049567736f1cccaa6fb4ac8ccee61999fb7ff6a8ae37c396

    • SSDEEP

      12288:y9ubWZlxi2odwvi/RwncvOAxsOioBTTUXS1SgJP1jzqn2:y9ubsPgw6ucvbsOioBUNgJP5qn2

    • Removes its main activity from the application launcher

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Matrix

Tasks