General

  • Target

    37d4c5a0ea070fe0a1a2703914bf442b4285658b31d220f974adcf953b041e11.zip

  • Size

    1.2MB

  • MD5

    8b2dd5ff29e2ed70fc99f2165f34d835

  • SHA1

    609915c7f21c458c03af518bdb48e05973125381

  • SHA256

    579c1a465c1ca49a6686dafcddb9134d9155803d7658379de8ca7722840a3371

  • SHA512

    03f46ea1a39c3926d0e47ab8a6218d6c7db8fdca91469538548b61be8d4061a2ce7762fb5c863de4cb780192850ea7017e2a5def314b6300bd7d2be6fef1a631

  • SSDEEP

    24576:88fcVKOtMyL7pFh77aPIKo6/nMPeu8iDeaKa0pQbV1GRxXUGcI:8McVDu+pf77oIKTnMWudet5wV1GRSGcI

Score
10/10

Malware Config

Extracted

Family

daam

C2

http://192.99.251.51:3000

Attributes
  • uri

    /socket.io

Signatures

  • Daam family
  • Requests dangerous framework permissions 18 IoCs

Files

  • 37d4c5a0ea070fe0a1a2703914bf442b4285658b31d220f974adcf953b041e11.zip
    .zip

    Password: infected

  • 37d4c5a0ea070fe0a1a2703914bf442b4285658b31d220f974adcf953b041e11
    .apk android

    com.android.callservice

    com.android.callservice.core.MainActivity