General

  • Target

    c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.zip

  • Size

    5.2MB

  • MD5

    8476e06aa0ac6d45a33a6d12ca0e2bce

  • SHA1

    35f0893a25870d1b7e538b101ee28f2153bc8031

  • SHA256

    3252f111238272c89ea4613917765d7510acf82e229bd68676dab5f20264cd6b

  • SHA512

    1c0acbcd42cdba596525756ceb79d4ba9ab139b581315a566b9029270be38896fa6526b71172a96dd517919e66c89184901d35de2c45ce68b9ce7c1cc519d484

  • SSDEEP

    98304:CGZm0dS2gpsICX2NWLbvKoLRc/tQsq2FOBt/j75Z6CZpSt1MHdJ+niSpchOg:CGZm0dAGICX68ntsPOB975zPSteHdU07

Score
10/10

Malware Config

Extracted

Family

spynote

C2

200.9.154.61:7554

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.zip
    .zip

    Password: infected

  • c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
    .apk android

    Password: infected

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    Password: infected

    mem.ken.investigate

    mem.ken.grcvihfunlarsuecqkoedapnwiodpdfpgqzhhsnbuphhlwlurl2.cqnfkdjutvxtgwzicagivypbedehostyjoktogcchuuhqfbhqx6SJTMB87