General

  • Target

    espia (3)_Dropper.apk

  • Size

    6.6MB

  • MD5

    1490bec2213c75a7291243a706998140

  • SHA1

    fbae531127f39bb43d6103f3bf765316cf8d9526

  • SHA256

    7dc2eccc96d606d4e90c30a330e680b58584d519cf509a653b1d28dd481519d4

  • SHA512

    28a9e74dff13c33845ab221a9ef2e49e13d5d926a57c0ce87f3698bdfa8f865d2390a3bc8952a2337f2c5025836da87a46990603437edd4428a2cf0e622df3c8

  • SSDEEP

    196608:82WCfD4h+1wYAVIu6B1N/jx0FiGbZXViQC:82W+4h+a7/M1Jx0FJbZFG

Score
10/10

Malware Config

Extracted

Family

spynote

C2

br2.localto.net:2530

Signatures

  • Spynote family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • espia (3)_Dropper.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    systema.verificado.protegido

    systema.verificado.tlqqivuefqjfqnynecqyvtlnjcedtynoazsjymdhafdhbvmmkv2.ksqjrbbghpdclrnidbwgwvgpztlskkuvksxulsafkkhwdytvte31


Android Permissions

espia (3)_Dropper.apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES