General

  • Target

    4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325.bin

  • Size

    766KB

  • Sample

    240702-1ytlyawdkn

  • MD5

    50d0afe092139c378447a243ed83b878

  • SHA1

    80e21c68e80ca94a5045bbcca63b6b5422047821

  • SHA256

    4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325

  • SHA512

    4e75a5d9b724f50ac177c8872f41208dccaf3c253ccb7e6551ed97f34f400a5ef8646c5ac0330a39909b937536c925678e18cb4f2a97e496330dedfd80e89660

  • SSDEEP

    12288:R85azD3Ea1a8LVegI3KasXf25WmpYshXZPbGwidNpgW:/D0a1aKegI6agf25WmD9idNpt

Malware Config

Extracted

Family

spynote

C2

363c-91-185-79-14.ngrok-free:9595

Targets

    • Target

      4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325.bin

    • Size

      766KB

    • MD5

      50d0afe092139c378447a243ed83b878

    • SHA1

      80e21c68e80ca94a5045bbcca63b6b5422047821

    • SHA256

      4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325

    • SHA512

      4e75a5d9b724f50ac177c8872f41208dccaf3c253ccb7e6551ed97f34f400a5ef8646c5ac0330a39909b937536c925678e18cb4f2a97e496330dedfd80e89660

    • SSDEEP

      12288:R85azD3Ea1a8LVegI3KasXf25WmpYshXZPbGwidNpgW:/D0a1aKegI6agf25WmD9idNpt

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks