General

  • Target

    97b57a4161923305dcba04fa8822be10c130083e2c5c24ad49a509f1cf1bd9ac

  • Size

    6.5MB

  • MD5

    1c7669d422b714378a28ed85361d6683

  • SHA1

    b8e51cdd4e78e07d7ea374c60692ff9e2b93c7d4

  • SHA256

    97b57a4161923305dcba04fa8822be10c130083e2c5c24ad49a509f1cf1bd9ac

  • SHA512

    1bce0127e91caae29d387be837f76c0ff370a20f5c83e815ed96def2fdf19ea3946cb2ed7c046c48a79fd69f1a006bcb48378c88c58b829212de4020fb807ad3

  • SSDEEP

    98304:OoNwJKiItDYLJoA0vDhJBZH2o1dJqvmzJzBaTa0teR7Wg:OQaKiIDYLZ0rHT71K+z25s

Score
10/10

Malware Config

Extracted

Family

spynote

C2

200.9.154.61:7554

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • 97b57a4161923305dcba04fa8822be10c130083e2c5c24ad49a509f1cf1bd9ac
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    ave.fri.portuguese

    ave.fri.jewkxqmjetaqwjqmbfkrsioxdpkdlcqikuaqcsakuzlrxjnbao2.fnxouydfzukzkaizmtliqlbrhsjqbitqnysisnfkkjeglwxfdt6SJTMB87


Android Permissions

97b57a4161923305dcba04fa8822be10c130083e2c5c24ad49a509f1cf1bd9ac

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES