Analysis

  • max time kernel
    3252023s
  • max time network
    119s
  • platform
    android_x64
  • resource
    android-x64-20220823-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system
  • submitted
    27-04-2023 08:28

General

  • Target

    36163bdac9b43d6521603b64bf766fe20c0877e11f004e1d4a887ca7722267a0.apk

  • Size

    3.1MB

  • MD5

    2eae007c0609ebcd31b85755bb3e29b3

  • SHA1

    3d54d2b2e65c3d2ba77f29d3d0a0911479d084ad

  • SHA256

    36163bdac9b43d6521603b64bf766fe20c0877e11f004e1d4a887ca7722267a0

  • SHA512

    1173842d45bd306a35523ec35edaefdef5503a0086934e624dd6512c2e93f1df05ef2a4e84059663e80bfca956bb0defd780bd4fdd49a3cc496432fcddf88c3f

  • SSDEEP

    49152:DHkIDR8XLj0uegq/BoQU3wV/u+b1ECq/SsrNW+avt/yNi9vhzfrDzQLu:DHvR8bdq3UexLyn8yOzfrDzQK

Malware Config

Extracted

Family

godfather

C2

https://t.me/rapmanterkorezimor

Signatures

  • GodFather

    GodFather is an Android banking trojan targeting Turkish users first seen in March 2022.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.shortform.app
    1⤵
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4716

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • [anon:dalvik-classes.dex extracted in memory from /data/app/com.shortform.app-lE_up-Phnja_3GbfaP92fg==/base.apk]

    Filesize

    4.1MB

    MD5

    76032e97b10da4cb2f41336b104e0fe1

    SHA1

    4f5732510170db8c6745bd7669abf7d8dab0e770

    SHA256

    971e261cb8031b740e3b3615a10dc8b7973394925c577cff7f5b73df4dad9b2e

    SHA512

    36645a5d35b826ac2e8b1e0a1c8d313bd535013776b2e6a50f118b2ac50b5e89599ea72b969ebf564db19e04f0e706c16483de622854f8001b4731a48f43c56d