General

  • Target

    3897f7cbe772a911009bc8d27117a6577b8905649b10f84552c2173364ee4f91.bin

  • Size

    4.4MB

  • MD5

    f5237faa629d0205892fc7ddc8d72fe0

  • SHA1

    d3d333684274bbcac70274e320344d65e59c88d0

  • SHA256

    3897f7cbe772a911009bc8d27117a6577b8905649b10f84552c2173364ee4f91

  • SHA512

    9451f8e1d3a246d2627c3270b2c02ac753970ebd93c9895ab4e059ebd3d584e9708130b6c4179211ea0c3560087425902518147bb1f7a6dba56c48a2a360f62e

  • SSDEEP

    98304:RnP05HwZrRo9v/4ienA3a0z59QZRTaF74Aj4YAC1T:t0wFRQQBAK0zm8FUAUW1T

Score
10/10

Malware Config

Extracted

Family

godfather

C2

https://t.me/pdfemonaserokim

Signatures

  • Godfather family
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • 3897f7cbe772a911009bc8d27117a6577b8905649b10f84552c2173364ee4f91.bin
    .apk android

    com.silkwoman.stroke

    com.silkwoman.stroke.Graminaceae


  • up.apk
    .apk android

    com.pitsaws.darcie

    com.pitsaws.darcie.pervalvar


Android Permissions

3897f7cbe772a911009bc8d27117a6577b8905649b10f84552c2173364ee4f91.bin

Permissions

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.QUERY_ALL_PACKAGES