General

  • Target

    CLARO-5G.zip

  • Size

    6.8MB

  • MD5

    3f30b04060504b8eee10f63a7b5ee333

  • SHA1

    84ccda1cd82d49adeee8728c2d7c030b00b06894

  • SHA256

    d9c4622355c9a9be398024b5e2242830e2244a0837991aafc053b71072ab798b

  • SHA512

    49c579451c28feda2fc7365e0bdccc5b7058b8785787fe974d0ab6c30e79b374177150db10924ebd35fdad542412cb75dcd9b2f203df98f1ad9730b4cc48a968

  • SSDEEP

    196608:MfXWlUXemq1XeagrhxvNG426d9wjERzBSa38b4/:IWKOmum5Nn267BSa3k4/

Score
10/10

Malware Config

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • CLARO-5G.zip
    .zip
  • CLARO-5G.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    carmen.likely.hardcover

    carmen.likely.hhqinncqvjuxclbvgdydmwwdipugocevhxzymezhhxrfqtscch2.MainActivity