General

  • Target

    e0eacd72afe39de3b327a164f9c69a78c9c0f672d3ad202271772d816db4fad8.zip

  • Size

    342KB

  • MD5

    0ea764afa833084b76e270f8e092204b

  • SHA1

    92e0bf9db0311561376026cb3bfeb858d2d253d9

  • SHA256

    e7f867923fd164c221616c59edf06d5c9f419bf76c508af26be541ab16745868

  • SHA512

    a0e982acc578b397652e8a37e7e67b7adb64683fc6fa24aed9c1cafc0e689522b8fbaf9a5bf0442ce4cf41c3f25c119d688160ab0002b38d39c82eaadabfe373

  • SSDEEP

    6144:Ex+uf/sJRaGItqp6zo9f3k7ONT76UB2jJdqGqimQq+2OcQGEgp3g7:6nsJ0GbpLUyNuU6jMJOcTEgs

Score
10/10

Malware Config

Extracted

Family

ahmyth

C2

http://82.146.35.240:80

Signatures

  • Ahmyth family
  • Requests dangerous framework permissions 11 IoCs

Files

  • e0eacd72afe39de3b327a164f9c69a78c9c0f672d3ad202271772d816db4fad8.zip
    .zip

    Password: infected

  • e0eacd72afe39de3b327a164f9c69a78c9c0f672d3ad202271772d816db4fad8.apk
    .apk android

    com.remote.app

    com.remote.app.MainActivity