General
-
Target
f062fbbd5f8f13fc2055f2395510160aad665250edb0777d84ed290470858bea.bin
-
Size
3.7MB
-
Sample
240719-12sttaselr
-
MD5
05e92d583b6aeb03d4b32b69621a031f
-
SHA1
4980438ef73b6d7638fa642e4e7e2915e814bda1
-
SHA256
f062fbbd5f8f13fc2055f2395510160aad665250edb0777d84ed290470858bea
-
SHA512
0d6e28ed4d01736b904dce1b2050f2c55939e81ff55b7bda982321200c1fd114b5ce5e6cdfe2a98bdcfec89014f7de04d1646b8758dc024b3dc1065f904c1ed8
-
SSDEEP
98304:mUM/iZqMh7w2sEIdqGJM3CQxY0Mu4KXKpTX5zKeloXjH9ks0LgZ:fMM7wVE4wCkV4keloXj90Le
Behavioral task
behavioral1
Sample
f062fbbd5f8f13fc2055f2395510160aad665250edb0777d84ed290470858bea.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f062fbbd5f8f13fc2055f2395510160aad665250edb0777d84ed290470858bea.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f062fbbd5f8f13fc2055f2395510160aad665250edb0777d84ed290470858bea.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
godfather
https://t.me/mazokoveraser
Targets
-
-
Target
f062fbbd5f8f13fc2055f2395510160aad665250edb0777d84ed290470858bea.bin
-
Size
3.7MB
-
MD5
05e92d583b6aeb03d4b32b69621a031f
-
SHA1
4980438ef73b6d7638fa642e4e7e2915e814bda1
-
SHA256
f062fbbd5f8f13fc2055f2395510160aad665250edb0777d84ed290470858bea
-
SHA512
0d6e28ed4d01736b904dce1b2050f2c55939e81ff55b7bda982321200c1fd114b5ce5e6cdfe2a98bdcfec89014f7de04d1646b8758dc024b3dc1065f904c1ed8
-
SSDEEP
98304:mUM/iZqMh7w2sEIdqGJM3CQxY0Mu4KXKpTX5zKeloXjH9ks0LgZ:fMM7wVE4wCkV4keloXj90Le
Score6/10-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-