General

  • Target

    2609dbe83514b307adda1e13f3eadede9d66b89a7b05959a08bb5bfbbac8cb03.zip

  • Size

    251KB

  • MD5

    f1de40dfe793cc7af67360501d34af8f

  • SHA1

    181ec0ee0242bcc32ff52e034cef4762826cba5b

  • SHA256

    2609dbe83514b307adda1e13f3eadede9d66b89a7b05959a08bb5bfbbac8cb03

  • SHA512

    00c71214f29404493850726f76334d63668f4c042c7794a776580eee268b7de7aa6ca77dd62e6eac7c9d3b5fd056a797216e02ab579f91e9e451d0f23d48db3a

  • SSDEEP

    6144:M1hHRxqLuEhE3DQ47JCNUy9ffFDZkIo7k3DmNWfmvvlM5Ne:IhHvGuqEb78N1forASwMvCe

Score
10/10

Malware Config

Extracted

Family

sandrorat

C2

googlesettings.system.net:1122

Signatures

  • Sandrorat family
  • Requests dangerous framework permissions 14 IoCs

Files

  • 2609dbe83514b307adda1e13f3eadede9d66b89a7b05959a08bb5bfbbac8cb03.zip
    .zip

    Password: infected

  • bc850c692e84f67ec59c08e6e893e479b6b1a24a5b4097dfa3c70396c9bb9b40.apk
    .apk android

    net.droidjack.server

    net.droidjack.server.MainActivity