General

  • Target

    YouTube.apk

  • Size

    20.4MB

  • Sample

    231103-q6wfdsbg2v

  • MD5

    2c0bab1ca0d92025176ddbaa2a493f8f

  • SHA1

    b40464cf0ced26ea18e13c2a0ffa42b15124b7c2

  • SHA256

    ddfddebc0022cb146440f1eecdd8039f012d0f19bd3bfe4ba272935fb8968da0

  • SHA512

    0413f83ee70b24540f3ddd684a07b76f616b0361f0735c1bfa5478823be7046fc5dc780f983f87851a9210def28f14cfe0af8b4e01a10b3e3aee0c886d44f939

  • SSDEEP

    393216:x6xhRim0VFAiwcdAKkX0WzmnNRoFhjssQAxAZbHobKz8p1VPrCwAUl1:kxhRiBV2i3dAxAnHo8sFxAhovp1VPrCg

Score
10/10

Malware Config

Extracted

Family

spymax

C2

7.tcp.eu.ngrok.io:19579

Targets

    • Target

      YouTube.apk

    • Size

      20.4MB

    • MD5

      2c0bab1ca0d92025176ddbaa2a493f8f

    • SHA1

      b40464cf0ced26ea18e13c2a0ffa42b15124b7c2

    • SHA256

      ddfddebc0022cb146440f1eecdd8039f012d0f19bd3bfe4ba272935fb8968da0

    • SHA512

      0413f83ee70b24540f3ddd684a07b76f616b0361f0735c1bfa5478823be7046fc5dc780f983f87851a9210def28f14cfe0af8b4e01a10b3e3aee0c886d44f939

    • SSDEEP

      393216:x6xhRim0VFAiwcdAKkX0WzmnNRoFhjssQAxAZbHobKz8p1VPrCwAUl1:kxhRiBV2i3dAxAnHo8sFxAhovp1VPrCg

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Tasks