General

  • Target

    e3a9acd8db3297d904c6d9327bad7f60.bin

  • Size

    11.8MB

  • MD5

    26e0cefb3148913c1b88426b3955de28

  • SHA1

    d6405cc9a19c2cbb940e4fadae063b144cb17c02

  • SHA256

    90733df0ad5a394fdbd4cabeb7a941de6ff8b97de5da89323d8c517c22172649

  • SHA512

    6508a86f7b5bfe178e37b180bc736f2307f47e95f0e522695ce9ebd0bef682c79163dabe5fa4ae2e952b3ec67c8e730c1ad19cfb4246f835b98808c9592d5495

  • SSDEEP

    196608:E2WabCc707iSw05xKyTwVBr/PCCH6iPuhnHYql8r7BZy0ZcaUWCZjBn7R1rjRDVZ:EOP+waxVTCrCCH6ionHYqlG7ykpUnxBB

Score
10/10

Malware Config

Signatures

  • Gigabud family
  • Gigabud payload 1 IoCs
  • GoldDigger payload 4 IoCs
  • Golddigger family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 19 IoCs

Files

  • e3a9acd8db3297d904c6d9327bad7f60.bin
    .zip

    Password: infected

  • dec84fd80056bef9ded372a07fd51ec675d5726b7593b8eefbe91f7ad81b3db5.apk
    .apk android arch:arm arch:arm64

    Password: infected

    com.sextest.test

    qsrflqhb.xerxsmzw.vcyowiub.ui.SplashActivity