General
-
Target
bfbdf0a2190cc3568dd07f50be86a681035fb6371c2e3b056db6cbf2a9b35279.bin
-
Size
3.9MB
-
Sample
240713-1xpllayfkm
-
MD5
0ee55e7dda5ca16de0519b60096ba709
-
SHA1
aeec7b300857cc3682309cbe23da177c13464f70
-
SHA256
bfbdf0a2190cc3568dd07f50be86a681035fb6371c2e3b056db6cbf2a9b35279
-
SHA512
15e8413422e177eecbfd4f5791efbdee7944f94a0022a4e72154df5598a17318895487dc30cb1aea37007b3195a69f132eed7b3a41a2bce09ffdca48ec4d34c2
-
SSDEEP
98304:Qo0LdGO0F97nRGgNfOBhymZR0H54Ph/de+vwlz4UXB+F:QdEM0ShRZIWRd9M4M+F
Behavioral task
behavioral1
Sample
bfbdf0a2190cc3568dd07f50be86a681035fb6371c2e3b056db6cbf2a9b35279.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bfbdf0a2190cc3568dd07f50be86a681035fb6371c2e3b056db6cbf2a9b35279.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bfbdf0a2190cc3568dd07f50be86a681035fb6371c2e3b056db6cbf2a9b35279.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
godfather
https://t.me/trinomazkonera
Targets
-
-
Target
bfbdf0a2190cc3568dd07f50be86a681035fb6371c2e3b056db6cbf2a9b35279.bin
-
Size
3.9MB
-
MD5
0ee55e7dda5ca16de0519b60096ba709
-
SHA1
aeec7b300857cc3682309cbe23da177c13464f70
-
SHA256
bfbdf0a2190cc3568dd07f50be86a681035fb6371c2e3b056db6cbf2a9b35279
-
SHA512
15e8413422e177eecbfd4f5791efbdee7944f94a0022a4e72154df5598a17318895487dc30cb1aea37007b3195a69f132eed7b3a41a2bce09ffdca48ec4d34c2
-
SSDEEP
98304:Qo0LdGO0F97nRGgNfOBhymZR0H54Ph/de+vwlz4UXB+F:QdEM0ShRZIWRd9M4M+F
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-