General

  • Target

    240520-ymr8mahkzq_pw_infected.zip

  • Size

    490KB

  • MD5

    0786b0443dc7e661cd9d02e32fcc7d24

  • SHA1

    bc6f02450fceffc7f71443ce6b4fad23d2e2d477

  • SHA256

    6a775c7d85f5caa06e9e8a09aca77bedf597f953c1bc0309e53f29a1097d7afe

  • SHA512

    b58e5417d8f40860828802c61cf2f8af2d0179df47e6763ea42bbc0c45dca8c79974c750f6fad1f210e043de5fff95d14934770febe3779df27408de00708154

  • SSDEEP

    12288:Lq2DzYGCHbi/fniURp/ucXF0yV7D6dFXAUkML0Ak0o/t:LPDy7HUSfywdR90ANoV

Score
10/10

Malware Config

Extracted

Family

spynote

C2

fffrrr.ddns.net:1143

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 18 IoCs

Files

  • 240520-ymr8mahkzq_pw_infected.zip
    .zip

    Password: infected

  • 15be150e6bc0434a9fc865eefe840990d57fb63cb078c19abc45f79adf587f3b
    .apk android

    Password: infected

    cmf0.c3b5bm90zq.patch

    cmf0.c3b5bm90zq.patch.C7