General
-
Target
ready.apk
-
Size
29KB
-
Sample
230905-1ggwtabe3v
-
MD5
962f63e9a636b8823b9844483f708d52
-
SHA1
fa026e27245c7c39840cf9c62955c44b67aca7e9
-
SHA256
4741a9c72551f2ad1eb0dd3d7b8f624137808d302ea78d8e0d9b924b9d79835a
-
SHA512
ace0b42e3297226159abcd854aa781867160f656f93db72893d3f8b9e7476083b88b7ca562aa12ee0c79937be09ca2ab6f20d9bc3aa4f9edd4fd7d33ebcbb168
-
SSDEEP
768:k8HA6juqnCGQ37oHMJmUcyFn69clXGj7UYRKgwS:k6AUC5EHMJJWcG4YRRF
Malware Config
Extracted
spymax
0.tcp.sa.ngrok.io:10649
Targets
-
-
Target
ready.apk
-
Size
29KB
-
MD5
962f63e9a636b8823b9844483f708d52
-
SHA1
fa026e27245c7c39840cf9c62955c44b67aca7e9
-
SHA256
4741a9c72551f2ad1eb0dd3d7b8f624137808d302ea78d8e0d9b924b9d79835a
-
SHA512
ace0b42e3297226159abcd854aa781867160f656f93db72893d3f8b9e7476083b88b7ca562aa12ee0c79937be09ca2ab6f20d9bc3aa4f9edd4fd7d33ebcbb168
-
SSDEEP
768:k8HA6juqnCGQ37oHMJmUcyFn69clXGj7UYRKgwS:k6AUC5EHMJJWcG4YRRF
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-