Analysis
-
max time kernel
50368s -
max time network
95s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
30-01-2023 14:04
Behavioral task
behavioral1
Sample
138551cd967622832f8a816ea1697a5d08ee66c379d32d8a6bd7fca9fdeaecc4.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
138551cd967622832f8a816ea1697a5d08ee66c379d32d8a6bd7fca9fdeaecc4.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral3
Sample
138551cd967622832f8a816ea1697a5d08ee66c379d32d8a6bd7fca9fdeaecc4.apk
Resource
android-x86-arm-20220823-en
General
-
Target
138551cd967622832f8a816ea1697a5d08ee66c379d32d8a6bd7fca9fdeaecc4.apk
-
Size
5.8MB
-
MD5
c685ca051d3ca0cdee08f5a33a548031
-
SHA1
e2757e1edd96238202862ba5e7f926f5a3911e17
-
SHA256
138551cd967622832f8a816ea1697a5d08ee66c379d32d8a6bd7fca9fdeaecc4
-
SHA512
fea2bdfe6653a1cba5c97ce87a464e56dc9deb0ac44ce17fcf7ff741d1630e0193e16c787bb6d457c72b7da8ae7d3547ad18c953fb2aeed8c58c3a0a3d016527
-
SSDEEP
98304:R/eo4hMLS/ppS5HjEoPkB49NLcJ7FJfWememnetVbIhXicG9bL+cLudyETyzfr9E:R/eo4t/jvqchnZCetVby09bCQudyMMH2
Malware Config
Signatures
-
GodFather
GodFather is an Android banking trojan targeting Turkish users first seen in March 2022.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.expressvpn.vpndescription ioc process Framework API call javax.crypto.Cipher.doFinal com.expressvpn.vpn
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD59f47baf3a9a6194affde23f6045a061d
SHA15f7777d88f68d11406d777a6221b79c66de22837
SHA2568300e9295420e9621c996b1e23bdc1c65a6707f72e12b73309667f7762917f50
SHA512cf224e18a29b3794f07cf96cdb1bbaf1ddaa6c56867429b02e93a173f262377721244383c2aad24ed46c6e9411e0ad8f4fdd7828de7c45c561fabb01836f9348