General

  • Target

    666_Dropper.apk

  • Size

    6.7MB

  • MD5

    1b898217b6ab25f0e750a93647239cc3

  • SHA1

    3983fd50854aeb2e0f2253f0257dc783270bbd33

  • SHA256

    9b318831ee9af6e3be7ea5f5a7ba701bbd3fc36983c7611e85b1c8d57b4bc1fc

  • SHA512

    e233e9b11d8a6d36c97d8209256c4f64624036bc2606848d58c155f61dd4f924289cc6f44ccf7118fee1367a77caaaa6dd7b1fda84d8590e908f77d13edf151e

  • SSDEEP

    196608:tm8lZWrktxO9ZFFw19HXWzUZntU8d9nmoqOM4:0LruOFFyuU5t1PQOn

Score
10/10

Malware Config

Extracted

Family

spynote

C2

us1.localto.net:8741

Signatures

  • Spynote family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • 666_Dropper.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    photoedit.analisar.org

    photoedit.analisar.diljcfxngwjsebuqjaxyiylagzyjlsqaeewghvcitvartxcczn2.nkeyzdvhebbboehsoviqaauvunfxvwigsadunkdcfnknzebavm31


Android Permissions

666_Dropper.apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES