General

  • Target

    ready_Dropper.apk

  • Size

    5.6MB

  • MD5

    f6fb4fab349cac445684c20f296cf00e

  • SHA1

    86c7025b811215bf300501df3edce48d795d9536

  • SHA256

    a59b9f0bb65f099407a9332faf917da5d98b3d9439e4f15e49dd566e8046e2f7

  • SHA512

    266cb91ab8d0e69630cbc0fac8a47241f0d63b2376f1819c3472b8f1534239c45ddf61145c71577f8e804b6f26da39d34f077f05896bc481e9ad273dff0ea4e8

  • SSDEEP

    98304:S9Ua/xa63aQuchSqbiajWU9IGj8eYfOuxBYA+lT542NK8I4N6M:Sj5a0aQuznaSUYGGBYA+B54mN6M

Score
10/10

Malware Config

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • ready_Dropper.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    india.qt.greatest

    india.qt.ciaimofajffuntyozqfqjsdqwgtxsdpbcerrinuzsurafnzfyf2.MainActivity


Android Permissions

ready_Dropper.apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES