General

  • Target

    ready.apk

  • Size

    29KB

  • Sample

    230807-gxab5adh57

  • MD5

    5e2d6a7c8bdee0f83c623afd72cf408e

  • SHA1

    98061a731f70f35c0e209696e5dc69232d20dc47

  • SHA256

    d832569f4bef206d50e2a2719312826d65ef7b95da9b008989b5d591195f9799

  • SHA512

    f917a43e62f324e610ecd16446e46623680330911e455427f8985aa14dadfd24a6da9a0e7ccad15dbe288c276943e7fe24429ed800e6a476cd109977fdb26949

  • SSDEEP

    768:g1qu/ssH/ZEqynEUsoKivy+apcKE85o0saXT10LOSgLud:XAssf+qyEEha+Aa820saDukq

Score
10/10

Malware Config

Extracted

Family

spymax

C2

147.185.221.16:14984

Targets

    • Target

      ready.apk

    • Size

      29KB

    • MD5

      5e2d6a7c8bdee0f83c623afd72cf408e

    • SHA1

      98061a731f70f35c0e209696e5dc69232d20dc47

    • SHA256

      d832569f4bef206d50e2a2719312826d65ef7b95da9b008989b5d591195f9799

    • SHA512

      f917a43e62f324e610ecd16446e46623680330911e455427f8985aa14dadfd24a6da9a0e7ccad15dbe288c276943e7fe24429ed800e6a476cd109977fdb26949

    • SSDEEP

      768:g1qu/ssH/ZEqynEUsoKivy+apcKE85o0saXT10LOSgLud:XAssf+qyEEha+Aa820saDukq

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks