General

  • Target

    7b77dfd02850aaf5d9c978dd531cd35f720a92a83376e8d58cffcde26dfbcfb1.bin

  • Size

    4.6MB

  • Sample

    240523-1wslvsad64

  • MD5

    0f10b0160f40b4e82a88eb5057fa0298

  • SHA1

    69329894d9d4a2ba5a22cc718fccd5f0485e6ce9

  • SHA256

    7b77dfd02850aaf5d9c978dd531cd35f720a92a83376e8d58cffcde26dfbcfb1

  • SHA512

    f9c66f495503da9282e7b33bd6555c59bd335ea5948c0b85e6dda43d8b1ec5b42b8ab1371e5530ac9cb8e6cbf96b769ee6996f38e31cf034557cf331834b4334

  • SSDEEP

    98304:qxIsLQWqxcq9sf/m7HODLqwAJYCfwyJdyRcJBj1ABr5CtoM7AZrfx:qxIsLfKs3m7H2yJYQwqyWnR25gofZrZ

Malware Config

Extracted

Family

godfather

C2

https://t.me/bavazarikopsared

Targets

    • Target

      7b77dfd02850aaf5d9c978dd531cd35f720a92a83376e8d58cffcde26dfbcfb1.bin

    • Size

      4.6MB

    • MD5

      0f10b0160f40b4e82a88eb5057fa0298

    • SHA1

      69329894d9d4a2ba5a22cc718fccd5f0485e6ce9

    • SHA256

      7b77dfd02850aaf5d9c978dd531cd35f720a92a83376e8d58cffcde26dfbcfb1

    • SHA512

      f9c66f495503da9282e7b33bd6555c59bd335ea5948c0b85e6dda43d8b1ec5b42b8ab1371e5530ac9cb8e6cbf96b769ee6996f38e31cf034557cf331834b4334

    • SSDEEP

      98304:qxIsLQWqxcq9sf/m7HODLqwAJYCfwyJdyRcJBj1ABr5CtoM7AZrfx:qxIsLfKs3m7H2yJYQwqyWnR25gofZrZ

    Score
    4/10
    • Target

      i.apk

    • Size

      3.9MB

    • MD5

      3b48d6176ebb206f48102dffe8c64d67

    • SHA1

      9d003ff7195d5930554ac92934f34cb5dbeae0ae

    • SHA256

      b655f341c88c73883f25cd6e12c1bf2c7e7e93af40ba2e1ac31cb4a749546a67

    • SHA512

      7a254961f15653985ebdd072f12da224e211ee3f3503f7d7f37b8463c2d0f02141bba7fe3c8151bb24472112ead6b480628c31a3630dfffd844acea56d28fe65

    • SSDEEP

      98304:GZcQHqHyEFcPBOffLa3WGJCateNzeDskD/sSJ67jQBBCu6Q6Xf:YXHqyQcPBMTyHJC6EeIkD8jQeQWf

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Prevents application removal

      Application may abuse the framework's APIs to prevent removal.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Acquires the wake lock

MITRE ATT&CK Mobile v15

Tasks