General

  • Target

    2fdd7de635cbe2cea317d4007fcf4804.bin

  • Size

    632KB

  • MD5

    f25e6b5415a35653faecb14d0ff84a8d

  • SHA1

    8c2d15210b6fe0528db3a6be53bc48821783178d

  • SHA256

    69be6c2259cf6ea683b3bf16b97337352f7b94f4a553d945a426d5a417c3ec58

  • SHA512

    6a194b9c2e95f6a57888ef4472e762ce913b4d3621d4ca13b76667cd6f008d406af904764c9b28a83202b262c1d1e13149ca4604e9cf6b6278d2cfcf4bfd4e48

  • SSDEEP

    12288:yx/Mc1HBEb7m3ioXqSvbfISABjNk9H+iR1ypKrVf+7vvefY:y/MccbSSNSjfISABiLRUpSaug

Score
10/10

Malware Config

Extracted

Family

spynote

C2

54.36.128.153:7771

Extracted

Family

spynote

C2

54.36.128.153:7771

Signatures

  • Spynote family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 15 IoCs

Files

  • 2fdd7de635cbe2cea317d4007fcf4804.bin
    .zip

    Password: infected

  • 566740aa5e33f0ba7b8d8ff447ae9ea961a05b53961feeda26d9bbd3938cf46d.zip
    .apk android

    Password: infected

    com.appser.verapp

    com.appser.replicationaconventionsvcargostriumphypittexpiresarachelnjoinsfcarlosgnationzcampingwpreliminaryd16