General

  • Target

    ready.apk

  • Size

    29KB

  • Sample

    230905-1ggwtabe3v

  • MD5

    962f63e9a636b8823b9844483f708d52

  • SHA1

    fa026e27245c7c39840cf9c62955c44b67aca7e9

  • SHA256

    4741a9c72551f2ad1eb0dd3d7b8f624137808d302ea78d8e0d9b924b9d79835a

  • SHA512

    ace0b42e3297226159abcd854aa781867160f656f93db72893d3f8b9e7476083b88b7ca562aa12ee0c79937be09ca2ab6f20d9bc3aa4f9edd4fd7d33ebcbb168

  • SSDEEP

    768:k8HA6juqnCGQ37oHMJmUcyFn69clXGj7UYRKgwS:k6AUC5EHMJJWcG4YRRF

Malware Config

Extracted

Family

spymax

C2

0.tcp.sa.ngrok.io:10649

Targets

    • Target

      ready.apk

    • Size

      29KB

    • MD5

      962f63e9a636b8823b9844483f708d52

    • SHA1

      fa026e27245c7c39840cf9c62955c44b67aca7e9

    • SHA256

      4741a9c72551f2ad1eb0dd3d7b8f624137808d302ea78d8e0d9b924b9d79835a

    • SHA512

      ace0b42e3297226159abcd854aa781867160f656f93db72893d3f8b9e7476083b88b7ca562aa12ee0c79937be09ca2ab6f20d9bc3aa4f9edd4fd7d33ebcbb168

    • SSDEEP

      768:k8HA6juqnCGQ37oHMJmUcyFn69clXGj7UYRKgwS:k6AUC5EHMJJWcG4YRRF

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Legitimate hosting services abused for malware hosting/C2

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v15

Tasks