General

  • Target

    ready.apk

  • Size

    29KB

  • Sample

    240205-v9n8psdbh9

  • MD5

    1b8df600f7bf3b251bd853c76305ed6d

  • SHA1

    a09ac4886ec338cda0bf8516d9401ee380d7405d

  • SHA256

    e0fc8abdd1dbc24ecf111fbead78f7709c3ea2d23052d145de9598905075de18

  • SHA512

    042e397c14d45c2465f38eced288096ce42cc169626aaa78e46a55579dd4d8b0fa89f6cc83b17ccb0bc7f2386e9834112dea2e9578fe5f1fcf2baafaf45ca533

  • SSDEEP

    384:iyoFPm2C8D8sPgJHho+qK3fomwoNGnruP4snfjMNV6MV6sq6Avte2XqwJJlEUF78:i7ewgk/wwB9nPsw8O6F6wJAUZ8

Malware Config

Extracted

Family

spymax

C2

vxcccc-23058.portmap.host:23058

Targets

    • Target

      ready.apk

    • Size

      29KB

    • MD5

      1b8df600f7bf3b251bd853c76305ed6d

    • SHA1

      a09ac4886ec338cda0bf8516d9401ee380d7405d

    • SHA256

      e0fc8abdd1dbc24ecf111fbead78f7709c3ea2d23052d145de9598905075de18

    • SHA512

      042e397c14d45c2465f38eced288096ce42cc169626aaa78e46a55579dd4d8b0fa89f6cc83b17ccb0bc7f2386e9834112dea2e9578fe5f1fcf2baafaf45ca533

    • SSDEEP

      384:iyoFPm2C8D8sPgJHho+qK3fomwoNGnruP4snfjMNV6MV6sq6Avte2XqwJJlEUF78:i7ewgk/wwB9nPsw8O6F6wJAUZ8

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks