General

  • Target

    ab6ae850a0fc87af0c005b93d40a6498.bin

  • Size

    2.9MB

  • MD5

    3b6c226f16b0ae3cc1187c81dcd04235

  • SHA1

    548b907948dff8de3d56ba50410554294072ce8f

  • SHA256

    151578ea2e756ac9bf10e4626902007a2899c465cfb6fdfec50ac253486bef7d

  • SHA512

    db40f8fa6d17a380f52ab23f34def7b7db940e71eeb8049dcc2562a639d7f19a73afb983e9dc6976d7f78304cc92ef4848d2c9bfc04707dc4f20f73844bc9a9d

  • SSDEEP

    49152:GVWfrVEO22nBJKxlHeF8a+ECT5FLULWY06ATjU3cKjLXxOosn75KuT:YWhyyJKuFtza5B226APWcKjLhOr8I

Score
10/10

Malware Config

Extracted

Family

spynote

C2

1.tcp.sa.ngrok.io:26109

Signatures

  • Spynote family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 8 IoCs

Files

  • ab6ae850a0fc87af0c005b93d40a6498.bin
    .zip

    Password: infected

  • f4286863673358b6f7eb370d0a991475fd769bbe8b1bd789d8c07a574b57963d.apk
    .apk android

    Password: infected

    com.bradesco.bradesco

    com.bradesco.umklokuzumksyjstwjnzybsuihnmlihntmkaquubluxtqzmhns2.djiqghtghkbpwyucnaihvvdotmldrxoitqmklcyemehsyqsjnf31