General

  • Target

    fotos (16).apk

  • Size

    7.6MB

  • MD5

    c79f0fe610b6e0366e073de780c8f26f

  • SHA1

    71f5cad0228d194b7ec930e42ae05da7f42dd1cd

  • SHA256

    1fdf6a9520a77ffd1b2dad78d859eca3349c81fb7be3e999604f4492019f179f

  • SHA512

    e939456302eb4abb34e6efd0b2a31469234a458d4b34270639ce2b369c6ff4f16ff3e8ff6d0c2c4683143e83c07ad8c5b660d7763dab20d1175aa349fa41b634

  • SSDEEP

    196608:PQGu8fEeidzmF+HO7QBJXw8rolALyy1E/Ls89U:Tu8seFWO7k7ro6Lyy1Eg+U

Score
10/10

Malware Config

Extracted

Family

spynote

C2

5cdnl0q.localto.net:8259

Signatures

  • Spynote family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • fotos (16).apk
    .apk android

    pbr.ddaw.wuicss.ncge

    com.appd.instll.splash


  • childapp.apk
    .apk android

    past.calculators.interior

    past.calculators.rugriwhjrryrdltvrszwnhmrxiibxtbgmsianvpeoridrzstdy2.fnutxdjscrwtngsxnajudhtxwzycxmeguglaikzdyixcthoehk31


Android Permissions

fotos (16).apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES