General

  • Target

    f0b5a0a0437867b234da31dcb57b511a.bin

  • Size

    6.1MB

  • MD5

    c4f4a555e72bdc51b88952be7d145431

  • SHA1

    41da5781b879ef4f44e3822d183ae1336457cee3

  • SHA256

    a9a6392aa471751bbb06d14d9e4a02314fec0e88ac82ce5ba21c4114e49c9399

  • SHA512

    87dc41dab4f276b0e2ff6e29ff0604c99c7d555f5a0ccc341380dbccc2f567707a75371dc6b749df832265f494d6862fab086a2654edc847ce462330552a1f30

  • SSDEEP

    196608:32vIP4va9Q8MllEvqDN0BcvYgOuwSEmr9R:wSQ8M3Kqr/gmr9R

Score
10/10

Malware Config

Extracted

Family

spynote

C2

3.tcp.ngrok.io:23649

Signatures

  • Spynote family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • f0b5a0a0437867b234da31dcb57b511a.bin
    .zip

    Password: infected

  • 8d0d5320c9016316de26412f32bb92a988e9c967ed83bae0b2de36d5b953e0a5.zip
    .apk android

    Password: infected

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    Password: infected

    television.streaming.stream

    television.streaming.osokjgliglzmolfmodvdvgynlmaerwmjonajcoepmjmjjdawyh2.ndzywvsfttoymwrfqeweeralmnjotdpmyteaynievhhxdtgytp31