General
-
Target
e7d6ce2ad7b816c2aeb19425d7a174ee6b04ea748abc84cb65eaaf2d408d430d.bin
-
Size
3.9MB
-
Sample
241018-1yjfzasflm
-
MD5
d7af53607ad462f1ace152be5c4bc79c
-
SHA1
dc7f8ed8b5de140adbe74719024c95be6efae9f7
-
SHA256
e7d6ce2ad7b816c2aeb19425d7a174ee6b04ea748abc84cb65eaaf2d408d430d
-
SHA512
a023143dd993724c4d2da5c1c7b267b461a1a83b610019c18950533b411dfece30f536468b4d9c1d74390e44067ac50d4c0d4a1cb78a07210dd15bd127111345
-
SSDEEP
98304:HwGuIdbuOsmIEWEA2uj2IL6ydhgavRkeTLCe:HoOuEuj2ILSekgCe
Behavioral task
behavioral1
Sample
e7d6ce2ad7b816c2aeb19425d7a174ee6b04ea748abc84cb65eaaf2d408d430d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
e7d6ce2ad7b816c2aeb19425d7a174ee6b04ea748abc84cb65eaaf2d408d430d.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
e7d6ce2ad7b816c2aeb19425d7a174ee6b04ea748abc84cb65eaaf2d408d430d.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
godfather
https://t.me/tumonokasiperake
Targets
-
-
Target
e7d6ce2ad7b816c2aeb19425d7a174ee6b04ea748abc84cb65eaaf2d408d430d.bin
-
Size
3.9MB
-
MD5
d7af53607ad462f1ace152be5c4bc79c
-
SHA1
dc7f8ed8b5de140adbe74719024c95be6efae9f7
-
SHA256
e7d6ce2ad7b816c2aeb19425d7a174ee6b04ea748abc84cb65eaaf2d408d430d
-
SHA512
a023143dd993724c4d2da5c1c7b267b461a1a83b610019c18950533b411dfece30f536468b4d9c1d74390e44067ac50d4c0d4a1cb78a07210dd15bd127111345
-
SSDEEP
98304:HwGuIdbuOsmIEWEA2uj2IL6ydhgavRkeTLCe:HoOuEuj2ILSekgCe
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-