General

  • Target

    157_Dropper.apk

  • Size

    7.3MB

  • MD5

    1fd06e016e8f9570b1f823312b9c1b4d

  • SHA1

    4835c5e33a3759f6f112a9d142185706ec791da0

  • SHA256

    282dea167fed15cb237a2367b24ccdf11e99c56ba6aeefa0a3847f83c432d60f

  • SHA512

    21b911e50eb80c2709b3f8091bcd582148bd0a30327b0b112cc5034829dcd3ae70ebd25b70ede0ccff34f7a777ad7b9e8749250de8759d199be97f98b94d6d37

  • SSDEEP

    196608:XFOrCaUeLoBHvMrhRIlg19WMp9OzoS958Ddxb:XFVaUooBHr+1DW/8V

Score
10/10

Malware Config

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • 157_Dropper.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    org.security.zap

    org.security.lhqwsyifhljaqdvrenfiffriyltrhyrchgavebqlacswgpjqls2.MainActivity


Android Permissions

157_Dropper.apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES