General
-
Target
d6cf5a3356359f59755b95c00394d3c41b992d1b52c5f25c6a8f759d9abdee08.bin
-
Size
3.9MB
-
Sample
240509-1w1bpsgg9v
-
MD5
72bad3bef6ee92412e4eda5cbfbc697e
-
SHA1
5fd49ffb15a64fc97557767fd82848432c36fb48
-
SHA256
d6cf5a3356359f59755b95c00394d3c41b992d1b52c5f25c6a8f759d9abdee08
-
SHA512
41e67b5b00e303d55ec0da960a8a96b2c1c6c1153805cdad12db8c703801fbe72b2a8c3415e2e9a4d233d24f4c0cf41e62908090bbe8213bf8a10b4632818330
-
SSDEEP
98304:GjtgxuG/UbOkN2uj1FDYZhk0mixcos+OF2ewCEPtqrXw46qa:GjtO3MNJDMkeSol02ewCIqM46qa
Behavioral task
behavioral1
Sample
d6cf5a3356359f59755b95c00394d3c41b992d1b52c5f25c6a8f759d9abdee08.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
d6cf5a3356359f59755b95c00394d3c41b992d1b52c5f25c6a8f759d9abdee08.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
d6cf5a3356359f59755b95c00394d3c41b992d1b52c5f25c6a8f759d9abdee08.apk
Resource
android-x64-arm64-20240506-en
Malware Config
Extracted
godfather
https://t.me/tumonokasiperake
Targets
-
-
Target
d6cf5a3356359f59755b95c00394d3c41b992d1b52c5f25c6a8f759d9abdee08.bin
-
Size
3.9MB
-
MD5
72bad3bef6ee92412e4eda5cbfbc697e
-
SHA1
5fd49ffb15a64fc97557767fd82848432c36fb48
-
SHA256
d6cf5a3356359f59755b95c00394d3c41b992d1b52c5f25c6a8f759d9abdee08
-
SHA512
41e67b5b00e303d55ec0da960a8a96b2c1c6c1153805cdad12db8c703801fbe72b2a8c3415e2e9a4d233d24f4c0cf41e62908090bbe8213bf8a10b4632818330
-
SSDEEP
98304:GjtgxuG/UbOkN2uj1FDYZhk0mixcos+OF2ewCEPtqrXw46qa:GjtO3MNJDMkeSol02ewCIqM46qa
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Acquires the wake lock
-