General

  • Target

    5169fcb3993aac2fcf77f68e7038b71f.bin

  • Size

    635KB

  • MD5

    f76a3bea5052677c7a23e929f4ceaacf

  • SHA1

    ccfe39932a1653c579763e3b32a33a379e1c1ce6

  • SHA256

    f2da8f2d56895bfdc4ddc9c2b30317ef01a58c32db0c1569de37bb51aac5d7af

  • SHA512

    7efa0ad494f66eeef64b26724076c0e814540c7c8ee5099e5c0425d7262dae7f104957cf6da1fbc5e947c69c1bbfb83da863e91b4e4085bc9fe74d4ad39b31f7

  • SSDEEP

    12288:xZFM8WC4DKAjDNz9AL7+XbLeEZvFNV2UvPDrJ0Adk:f6tDKKDt67+rLeE5FNNvrrqYk

Score
10/10

Malware Config

Extracted

Family

spynote

C2

172.214.219.5:8080

Signatures

  • Spynote family
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 14 IoCs

Files

  • 5169fcb3993aac2fcf77f68e7038b71f.bin
    .zip

    Password: infected

  • e161e10a6532aeacfb536122b4356bfcde20e64f0bef827d3467e0a14ee97555.apk
    .apk android

    Password: infected

    com.jenny.duplicate

    com.jenny.killerksatisfyrtracymevazhotellraisefchristiansisolutionshsheerzhopingnprintingzpendingxfiftyc16