General
-
Target
bd9e611efebb551cd7047d8634939d715fb14adaa1ce17a6078ac322b282fd2f.bin
-
Size
3.9MB
-
Sample
240827-1ww92svhkk
-
MD5
c0c8fd4eec5c14104ef5c9ef4c488a3c
-
SHA1
7d489deb6363017ae7b8039b7f97da6bc2174838
-
SHA256
bd9e611efebb551cd7047d8634939d715fb14adaa1ce17a6078ac322b282fd2f
-
SHA512
3597c5e74b052a306771bd566eafb16dda7d0b31d2cbb458cce0cedb77cd14c6f82abf60d5158f0dbb28eb456dbcad7f434a6115855dec57f922dcc9a2c3167c
-
SSDEEP
98304:u3a9Fe7nRvwPvfQho5cuVM5N2uOCUgstXRQzkFfSvNgqDz2fb:uqO1PaCuVM/GtRFfigo2fb
Behavioral task
behavioral1
Sample
bd9e611efebb551cd7047d8634939d715fb14adaa1ce17a6078ac322b282fd2f.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bd9e611efebb551cd7047d8634939d715fb14adaa1ce17a6078ac322b282fd2f.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bd9e611efebb551cd7047d8634939d715fb14adaa1ce17a6078ac322b282fd2f.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
godfather
https://t.me/trinomazkonera
Targets
-
-
Target
bd9e611efebb551cd7047d8634939d715fb14adaa1ce17a6078ac322b282fd2f.bin
-
Size
3.9MB
-
MD5
c0c8fd4eec5c14104ef5c9ef4c488a3c
-
SHA1
7d489deb6363017ae7b8039b7f97da6bc2174838
-
SHA256
bd9e611efebb551cd7047d8634939d715fb14adaa1ce17a6078ac322b282fd2f
-
SHA512
3597c5e74b052a306771bd566eafb16dda7d0b31d2cbb458cce0cedb77cd14c6f82abf60d5158f0dbb28eb456dbcad7f434a6115855dec57f922dcc9a2c3167c
-
SSDEEP
98304:u3a9Fe7nRvwPvfQho5cuVM5N2uOCUgstXRQzkFfSvNgqDz2fb:uqO1PaCuVM/GtRFfigo2fb
Score6/10-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-