General

  • Target

    Фоточки.apk

  • Size

    5.4MB

  • MD5

    d87c5428d2ea1698309431f715227084

  • SHA1

    4ba458a6671ab8830f0e1cb782de386cbc5e388a

  • SHA256

    d8438b05118a01791311dcadd84d429191a9975f9afa8310a4a92ade5a2bc4d2

  • SHA512

    c24dedb312049be82be6189ee638b2b354b16796944b82b7fc263d923b1afc7352658188e3e17f52f75b3caed85764c73c1f721eb7eeaeac6c4813da0aa6a7e7

  • SSDEEP

    98304:aZBgLCrAZMbyDt4QjH2OFo2Ew+Y9883t9qdAY2EUXHbhbuZOf8eepoVP8BHq:Okkc4Qr2OFoZ+32A3ztuZOkeVPgHq

Score
10/10

Malware Config

Extracted

Family

spynote

C2

91.214.78.18:7771

Signatures

  • Spynote family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • Фоточки.apk
    .apk android

    jqzlto.nuhkrf.uehkxv

    net.collez.never.b


  • lariska.apk
    .apk android

    trace.editorial.georgia

    trace.editorial.hfyxfwtanfkayywtkadsupisewcmdcxdtzrpgslrhikolvlkzq2.numnoyutbhncvbqkrohuviahfyrunsrsmknmlbxrycrvsresii31


Android Permissions

Фоточки.apk

Permissions

android.permission.REQUEST_INSTALL_PACKAGES

jqzlto.nuhkrf.uehkxv.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION