General

  • Target

    ready_Signed_Dropper.apk

  • Size

    5.6MB

  • MD5

    2a91d282b2eda3ab9633b71cfb5cfe9a

  • SHA1

    be4b0efc574d9de6804998e87fa6044885472a8b

  • SHA256

    4f381258318f1884ecd68822131ce0bf0d7d68f926531dfb2d78bb979bd26f3c

  • SHA512

    ea12cff2fe1db1de9ff4196ab5ec50e9390f4b2b9aa00545b9b37c08dff2e7cd78eccd5ca857392195e32fac6df580304d74e208cbe8f3d3d07d26e903383f03

  • SSDEEP

    98304:4rz0l7BrCZr+4XLIXVQhn+gRQJlrqk+xfX1IOXO3ST/OeIhrgjX47fcW0asVIH90:4rfZ5XMXajOrqkyaO+WOLb7f4HIK

Score
10/10

Malware Config

Signatures

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • ready_Signed_Dropper.apk
    .apk android

    com.appd.instll.load

    com.appd.instll.splash


  • childapp.apk
    .apk android

    concrete.ban.roger

    concrete.ban.qcygofdrmijiebdtqmtxzhflewglovuvrsesevvnqdposrjzsq2.MainActivity


Android Permissions

ready_Signed_Dropper.apk

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES