General

  • Target

    21d178e0688af591964ae00b71263d2e086706017ebc98d7488d57771144d337.zip

  • Size

    251KB

  • MD5

    7443d602e4ac5e48ace17d79000f96ea

  • SHA1

    9d50276387d01a9bbe432fa0a56b83d3f39d8118

  • SHA256

    f2d3842ed505276ad4cbecdb648107a55a6e8171184e059a1a506a8caa213df1

  • SHA512

    32078e408a6f8c3b662615516099a0914cffaa87adea8b4c0749fc1fdfad3eb2a8394055e36ce95185619d26032f62f0fa26e6f551f92b15d83b602311bb9c92

  • SSDEEP

    6144:MfvzlVAX54ZGKdyi6wvfJ5+RS7z6+R6ikzY:MTlVc54Z7yrIX+HpY

Score
10/10

Malware Config

Extracted

Family

sandrorat

C2

62.173.138.15:1177

Signatures

  • Sandrorat family
  • Requests dangerous framework permissions 14 IoCs

Files

  • 21d178e0688af591964ae00b71263d2e086706017ebc98d7488d57771144d337.zip
    .zip

    Password: infected

  • 21d178e0688af591964ae00b71263d2e086706017ebc98d7488d57771144d337.apk
    .apk android

    net.droidjack.server

    net.droidjack.server.MainActivity