General

  • Target

    ready_Dropper signed.apk

  • Size

    5.4MB

  • MD5

    d6f30ed41d571152ff54caea0b89894f

  • SHA1

    e0c7a684ea7b9721a4dab74125521d3ee702a508

  • SHA256

    fd2047f16b7441320c8494d9bcd45ef122d984478e120bede8ae5f0ddb42b206

  • SHA512

    6c724aaebdbab53b865a72be7e09e59e53e2e69a52269ab2c641b84a0656e1838dce7881d2eecdab949442c3ee702779eea01453907970d47a4967edd2975209

  • SSDEEP

    98304:ab/6jA2/822LF8h83ysgY2E+fM1jHsFazcBdNcOjLKY+gH6Ve9sjbNXzq/UmTcC0:+6j52ih83nD+fs7lz+fZLCDq/XTcCucU

Score
10/10

Malware Config

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • ready_Dropper signed.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    postcards.abraham.couples

    postcards.abraham.gmgzdoacwdfubhtabxtcguafvwblaycjtzzabzkabveehljcoy2.MainActivity


Android Permissions

ready_Dropper signed.apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES