General

  • Target

    43dfad0105237120faf0ff6e728c345f.bin

  • Size

    3.4MB

  • MD5

    b536db5e4dfc49550db432db10e918c5

  • SHA1

    4f925b1976978edab9956bec4fec82924609d122

  • SHA256

    da8b5d5121bc85f1ca3afcacc205d588b291a96ee5e7e22421d595a89d365b86

  • SHA512

    bef6df0d97a4e264c4dd23dac964af35ae7ea9530b55533216f571b37fc81fab99c14b3beff0985217892628a77d9876682a88a98e3383157d35f18db51f344d

  • SSDEEP

    98304:cXR/GaYTCrN3x7VPaLgNot3/qA9+6omndke:CVYTCrN3x7CwWTomdB

Score
10/10

Malware Config

Extracted

Family

spynote

C2

tsecurityspider.duckdns.org:7771

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 15 IoCs

Files

  • 43dfad0105237120faf0ff6e728c345f.bin
    .zip

    Password: infected

  • 16cd99b63779ea23816b8e4c29650bdcd8e7804204fbcfcedcfbec4274cdc470.apk
    .apk android

    Password: infected

    gains.secretariat.johnson

    gains.secretariat.kyysjmaqyrxdzemsgsgrjolilcxgjhwwpqewqsnionbietgmxy2.qcidfghencmhirqdqjjcejxyllrnnembmfacedzfucgslnjjik6SJTMB87