General

  • Target

    c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk

  • Size

    6.6MB

  • MD5

    1d3bf0fb430b02719e7dd9d593c7c9fa

  • SHA1

    68e0ea024fafb0c1c08557c7f6cfd84e418c5533

  • SHA256

    c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b

  • SHA512

    828831d1511204122f4f73545595e5f325c52a94d6dc0d0ca31aa5cd091a3842bfce817a7ae0a2f8a97d376872094a784d5108c35eefa6dbdc835a519a3f7a17

  • SSDEEP

    196608:sOk8v7XjvfAS9XzgHLE10b0mgMkmupz/oSmw:sOjjjvfAqXWLEiIkOgSt

Score
10/10

Malware Config

Extracted

Family

spynote

C2

200.9.154.61:7554

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    mem.ken.investigate

    mem.ken.grcvihfunlarsuecqkoedapnwiodpdfpgqzhhsnbuphhlwlurl2.cqnfkdjutvxtgwzicagivypbedehostyjoktogcchuuhqfbhqx6SJTMB87


Android Permissions

c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES