General
-
Target
06c2692c014d22ec9689c082b57b8905771d31679c354e3731b1503fcdd799d7.bin
-
Size
3.9MB
-
Sample
241012-1y283steld
-
MD5
399d516ccc8046fcff9300397a441dc7
-
SHA1
9c5340383eb9e5cfb400d4710dfb667bca25a1dc
-
SHA256
06c2692c014d22ec9689c082b57b8905771d31679c354e3731b1503fcdd799d7
-
SHA512
a795e971af49b74b6c0e71f6683faac3afdb91acbdb2c066a84c31412c93c10bcf2f528c7a13ba4d5ed94a2df2aa415767402fd822c17d78b39a793f05ddb247
-
SSDEEP
98304:e3IhYC3gkvbsCa5Q93phhqJzhcavkts05koUM44eMT7M4z:vR/TwQC5hcN9qMIMM4z
Behavioral task
behavioral1
Sample
06c2692c014d22ec9689c082b57b8905771d31679c354e3731b1503fcdd799d7.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
06c2692c014d22ec9689c082b57b8905771d31679c354e3731b1503fcdd799d7.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
06c2692c014d22ec9689c082b57b8905771d31679c354e3731b1503fcdd799d7.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
godfather
https://t.me/uyamozakeposere
Targets
-
-
Target
06c2692c014d22ec9689c082b57b8905771d31679c354e3731b1503fcdd799d7.bin
-
Size
3.9MB
-
MD5
399d516ccc8046fcff9300397a441dc7
-
SHA1
9c5340383eb9e5cfb400d4710dfb667bca25a1dc
-
SHA256
06c2692c014d22ec9689c082b57b8905771d31679c354e3731b1503fcdd799d7
-
SHA512
a795e971af49b74b6c0e71f6683faac3afdb91acbdb2c066a84c31412c93c10bcf2f528c7a13ba4d5ed94a2df2aa415767402fd822c17d78b39a793f05ddb247
-
SSDEEP
98304:e3IhYC3gkvbsCa5Q93phhqJzhcavkts05koUM44eMT7M4z:vR/TwQC5hcN9qMIMM4z
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-