General

  • Target

    97cf6752734816208ff03eea523825bcfc7270d52d8c5f0f02951236885e0403

  • Size

    12.5MB

  • MD5

    42ad0ff73e0b4295a4ae2ca600b9e5fa

  • SHA1

    7dd9260843bb1ee8613fc2eb913e776b4c0fcbb4

  • SHA256

    97cf6752734816208ff03eea523825bcfc7270d52d8c5f0f02951236885e0403

  • SHA512

    59efd73b3eb3ff2a17bf88b42575d142fd54c9eda6eb5316444efa14c1980991e11e1780ea3f71d082d5bef7ec74fe023d221ed962b083650ed9f4c6ffc766ee

  • SSDEEP

    196608:mAgbdVg7aNmVAcIro36mugUFcs1Pohd2r7+2Lejjd/1dTWr2pRCYgY8:mAg5N8Atro78cskT2LijZHWipRFP8

Score
10/10

Malware Config

Extracted

Family

spynote

C2

103.74.105.194:7003

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 8 IoCs

Files

  • 97cf6752734816208ff03eea523825bcfc7270d52d8c5f0f02951236885e0403
    .apk android

    com.shes.maox3000k

    com.app.maox3000k.ActivitySplash


Android Permissions

97cf6752734816208ff03eea523825bcfc7270d52d8c5f0f02951236885e0403

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.FOREGROUND_SERVICE

android.permission.RECEIVE_BOOT_COMPLETED

com.google.android.c2dm.permission.RECEIVE

android.permission.VIBRATE

android.permission.KILL_BACKGROUND_PROCESSES

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.WRITE_SETTINGS

android.permission.SYSTEM_ALERT_WINDOW

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.WAKE_LOCK

android.permission.RECEIVE_SMS

android.permission.SEND_SMS

android.permission.READ_SMS

android.permission.WRITE_SMS

android.permission.RECEIVE_MMS