General

  • Target

    com.baniiz.kedra_Dropper.apk

  • Size

    9.7MB

  • MD5

    a391b86ee6657266fda0d4e9c3c4dd35

  • SHA1

    66b40102b707f8133a9313e61560873e4a57fb71

  • SHA256

    c12f029e940b13af201e70d4ea48b4cb4bdfafd170933c56326400810210bfc2

  • SHA512

    174a9eca2da9fafbe511b84e5d56a834df1fd93741db300412c62c1d26cfb0adb83129af6f8e79364e311a988fad3ff0ab15603e81eb1f91e2c27195259f0deb

  • SSDEEP

    196608:WBw4yX54tND8swBsGEsKchHfpJBOa+/lcN6I99u6V:6S4Po7sGB9HfpTO6N6I9IS

Score
10/10

Malware Config

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • com.baniiz.kedra_Dropper.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    build.ledear.bylwn

    build.ledear.qdqnckphnskpoklnucahafazzeueiinkgelekbdwndgdqmgone2.MainActivity


Android Permissions

com.baniiz.kedra_Dropper.apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES