General

  • Target

    d96ee475dd19e74082f86e8441711216.bin

  • Size

    2.9MB

  • MD5

    4028e6c2e7182be297ebc52ee790eaca

  • SHA1

    bccca0965af12e65107c26e299e77035b86362ca

  • SHA256

    b960ede018834eb90efc27162c488cf329c49ca62475661907af0edcd8221364

  • SHA512

    abb688abcfb33ccd0f02b1d3ee6acc11d5ef9b5cce2c9a34755715fedcb2163eac7e7f269fbb70087f8a434143f3fe655b9b5ef58043c182587c159022c2f2ed

  • SSDEEP

    49152:ptkFWK0VivjXaqruiUW4TAcp+rPo3V2DLM7QMpY7XiIlLTjOst5AKnJoi0isweqH:ptkwYjX/rui0ZMryEI7QMpYzlL3b5bJh

Score
10/10

Malware Config

Extracted

Family

spynote

C2

xavier222-62842.portmap.io:62842

Signatures

  • Spynote family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 15 IoCs

Files

  • d96ee475dd19e74082f86e8441711216.bin
    .zip

    Password: infected

  • 3ef9e9ab4b0f5c39d65f43b2227984e6ca423adad60e828f6af2e0eb7ac78284.zip
    .apk android

    Password: infected

    fs.mazda.rentals

    fs.mazda.tzsspzdssoaujdscwsqdlqhlnmayswwheudxzdqgnoyjosjkub2.ynesavewaqujnfyztwvkmybwuflwyxxipcrhuvoiczgzmfqaeh31