General

  • Target

    4793b7d02cd520c5cb3289d989cff3cb218dc78fa48619c168f6a8f8fdbc5972.bin

  • Size

    4.6MB

  • MD5

    29f8ab525b75cf601c9ec5cf6899deb4

  • SHA1

    e9cb9ff08c568427400e6fa88b8f55a2783a21de

  • SHA256

    4793b7d02cd520c5cb3289d989cff3cb218dc78fa48619c168f6a8f8fdbc5972

  • SHA512

    e250e3e94019e43d9c1e5cd3fc6de0c56cdf32df92915cc7e08c1fabe059139aa4b76a29fda6f631ad41e3174c66c710ac7fe32869be169f1363e273b19112c1

  • SSDEEP

    98304:a9adIljqoYWfKDBVijib92k1ZHNajQY3ZJ3:a4dWq/RDBViib9zZHN4BpJ3

Score
10/10

Malware Config

Extracted

Family

godfather

C2

https://t.me/zamukosaremopas

Signatures

  • Godfather family
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • 4793b7d02cd520c5cb3289d989cff3cb218dc78fa48619c168f6a8f8fdbc5972.bin
    .apk android

    com.chairwomen.callao

    com.chairwomen.callao.relisted


  • up.apk
    .apk android

    com.estate.vertebrates

    com.estate.vertebrates.dodecylene


Android Permissions

4793b7d02cd520c5cb3289d989cff3cb218dc78fa48619c168f6a8f8fdbc5972.bin

Permissions

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.QUERY_ALL_PACKAGES