General

  • Target

    ready_Dropper.apk

  • Size

    6.5MB

  • MD5

    03e3b79dbeb504ae75b1aa1ef9667a25

  • SHA1

    c1f8b981a980e4310911a7e84eef4261f6a1a77b

  • SHA256

    760b4865a6f5e793641c58ab938e3b136ffb3690f725bf0b590c3ee892f311f3

  • SHA512

    446c40e433fdb0289ecb3898335020d6125e0b6ea21a4bd7265d7e1b6075e87044431ceb3911e84bbfe2af306c0ae2507ac876b160929a5387eee7237e31b54e

  • SSDEEP

    98304:z1bjHHCcbuxlATLLGuZvmd9fswjbrucGwNGErukpLGiCsmzQzBmTy0tJios:JbjnC8uLkvfZvmf0SRX/5jC7ztxS

Score
10/10

Malware Config

Extracted

Family

spynote

C2

bush-advance.gl.at.ply.gg:33628

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • ready_Dropper.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    deposit.rules.plain

    deposit.rules.yozknfvkobeawjtrkfvqrbldamrgjecaxewuupqkwfzpdvynqs2.ozuejydkimqonlazwhwimzitjjwwxhfrohryqtfdtniehgdqxd6SJTMB87


Android Permissions

ready_Dropper.apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES