General

  • Target

    ready (4)_Dropper (2).apk

  • Size

    6.6MB

  • MD5

    d1a5cc5d21d96634cf7de550d2669647

  • SHA1

    4cfd20130c734de24beacabdd84768d702642c95

  • SHA256

    d1513a01b95f752ecf4bc6f7c110b7f13efa03df22b1ad27ee30bd0cca13349c

  • SHA512

    f2f8e2e5c0fb443ede592bb9489a842c61dbe256a9c4eddfca196f30bb2f8493c472e5a62c10b80c1306ced90ed3b72c938df261c773273bb240e63fe2e82ba6

  • SSDEEP

    196608:/nE1NV3eQyQn9d1C7BUe/Ucxt9yatmKXh0Lcd7RW:/nEzVHrnb87BUerxfPvXTd7s

Score
10/10

Malware Config

Extracted

Family

spynote

C2

br2.localto.net:1105

Signatures

  • Spynote family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • ready (4)_Dropper (2).apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    fotosshop.org.nacionalphotos

    fotosshop.org.xxqjhefiuhnbnwhcshusfpebmmglfntlqkawvgdqgayirftsgt2.wafctvbyyntqjtfvaxcakzsisbmazwmnsbkcfzgfmimtswrunc31


Android Permissions

ready (4)_Dropper (2).apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES