General

  • Target

    e1a7b41910ea73b4b5bc4108c4f9ff7a842bedc7fb18f2c3497665942a51c6f0.zip

  • Size

    480KB

  • MD5

    695afdefa606fe4783c601a97a69e14e

  • SHA1

    78ef34b431ef090afcd53bde064ff06d34feab45

  • SHA256

    f7491fa6b0798fae9fc822e4c43e9d6e1ba6bf1f853c1802ab8310813eecf3e0

  • SHA512

    fde8627b5845b2f3477a6eea47bd3da181bd0951c0d89ff57dd208b2d1733c13d47f6579d95f87d37ae08662cbe8067961c1957b023e857d751444b701ad89f8

  • SSDEEP

    12288:EvmcDQGbLR+hmqo8bkQEhgTAtE8gUQ/CObCaRL:EvvDfL0TomoN6qO9

Score
10/10

Malware Config

Extracted

Family

spynote

C2

solution-athens.gl.at.ply.gg:58433

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 18 IoCs

Files

  • e1a7b41910ea73b4b5bc4108c4f9ff7a842bedc7fb18f2c3497665942a51c6f0.zip
    .zip

    Password: infected

  • e1a7b41910ea73b4b5bc4108c4f9ff7a842bedc7fb18f2c3497665942a51c6f0.apk
    .apk android

    Password: infected

    cmf0.c3b5bm90zq.patch

    cmf0.c3b5bm90zq.patch.C7