General

  • Target

    5c72f792fdcdcfa94696054bd4f655cd46cff749e152231a3ff80e1235cd36c2.bin

  • Size

    4.6MB

  • MD5

    beb541208596fd1c467741adaeb1fea7

  • SHA1

    feb2f78e1ccb78e6991630dfe7524f4d0883a499

  • SHA256

    5c72f792fdcdcfa94696054bd4f655cd46cff749e152231a3ff80e1235cd36c2

  • SHA512

    17ff8b596fe047f4b4a93eb1575e8ab789d7ba5cf3d09ebab27a8467a5780275d15bfeb7bd9141e4d31c230facef1c84f14b3fc60df3d0d991f4a2d1a3f613c4

  • SSDEEP

    98304:H+/R9Y9xPKnfRPrdAQXIHZpMRVR0IMODvIZ0gMmtX:e5r5pA1Zp4NDYtX

Score
10/10

Malware Config

Extracted

Family

godfather

C2

https://t.me/zamukosaremopas

Signatures

  • Godfather family
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • 5c72f792fdcdcfa94696054bd4f655cd46cff749e152231a3ff80e1235cd36c2.bin
    .apk android

    com.shellers.servantship

    com.shellers.servantship.plebs


  • up.apk
    .apk android

    com.kuttawa.subabbots

    com.kuttawa.subabbots.corporate


Android Permissions

5c72f792fdcdcfa94696054bd4f655cd46cff749e152231a3ff80e1235cd36c2.bin

Permissions

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.QUERY_ALL_PACKAGES