General

  • Target

    b22e56b7286a136efaeb475ab8f2abd0dcc74768cf034320a481b90d3da3a06b.zip

  • Size

    2.8MB

  • MD5

    27692eb5e3079ad472fd60a55b380526

  • SHA1

    08340eedeca883eb9ec8f06f261e38f926d8e795

  • SHA256

    bfe640de19198dc0c52e6880a7accdaf0549574a542470204543830f5e1b1291

  • SHA512

    69809e18faa539295960b776bbb67b2ea64afc530999522a1c8d19d49ce3b71c7835404c3be183cd059a9e53897c92d4b140f9aedbaf1e3acb84c76716e632ef

  • SSDEEP

    49152:VrfJ5tqdZrNWFs/vOz2qVJ0V89m7TTQlM/ktFpvKuWctC4lz2dxkgosqMm79iVpu:XHqh/vGOV17T5IFFKuWcjl2Lkqqr79gg

Score
10/10

Malware Config

Extracted

Family

spynote

C2

8.tcp.eu.ngrok.io:27466

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 15 IoCs

Files

  • b22e56b7286a136efaeb475ab8f2abd0dcc74768cf034320a481b90d3da3a06b.zip
    .zip

    Password: infected

  • psb guard.apk
    .apk android

    dinner.dispatched.pierce

    dinner.dispatched.jxuxcavfswsxkijazbdjareezbbfvdrtxqoiailifpqflmyjut2.mztiqhhnduyyfdqhctrylnmagqqakkiocetossreewonnrxqca6SJTMB87