General
-
Target
24e2f10dfbbc24835214920dca8321ee5871688e92f201065e3a07b33788d83f.bin
-
Size
3.9MB
-
Sample
240905-1xndja1bnq
-
MD5
a17e92d3f29e68604ef95897a7cabe12
-
SHA1
5baa9f51bad5673229bcb8ad629e186c40562b38
-
SHA256
24e2f10dfbbc24835214920dca8321ee5871688e92f201065e3a07b33788d83f
-
SHA512
8c2f7f8dbd11475cc276c585c5c523e127cc63d1f11b691c402761295c4b6461550529badf071c422618418bc2fea32b570fd63d156392b1fdaad8d3dcd6986f
-
SSDEEP
98304:JUitrOnKQb03/fEdKDyBmeeCfwxObIKgH7EZa:yiAb03nERBmqgOdgAZa
Behavioral task
behavioral1
Sample
24e2f10dfbbc24835214920dca8321ee5871688e92f201065e3a07b33788d83f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
24e2f10dfbbc24835214920dca8321ee5871688e92f201065e3a07b33788d83f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
24e2f10dfbbc24835214920dca8321ee5871688e92f201065e3a07b33788d83f.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
godfather
https://t.me/yazmozaramekos
Targets
-
-
Target
24e2f10dfbbc24835214920dca8321ee5871688e92f201065e3a07b33788d83f.bin
-
Size
3.9MB
-
MD5
a17e92d3f29e68604ef95897a7cabe12
-
SHA1
5baa9f51bad5673229bcb8ad629e186c40562b38
-
SHA256
24e2f10dfbbc24835214920dca8321ee5871688e92f201065e3a07b33788d83f
-
SHA512
8c2f7f8dbd11475cc276c585c5c523e127cc63d1f11b691c402761295c4b6461550529badf071c422618418bc2fea32b570fd63d156392b1fdaad8d3dcd6986f
-
SSDEEP
98304:JUitrOnKQb03/fEdKDyBmeeCfwxObIKgH7EZa:yiAb03nERBmqgOdgAZa
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-