General

  • Target

    5c4882a7a66c0dfb2fe3814c08bf669e.bin

  • Size

    11.5MB

  • MD5

    c023fd47afee4567ad736019ef458658

  • SHA1

    6583b735d64de5c84a0d72e1e657c3d2f8351dc5

  • SHA256

    29d6baab55d67bc412a4eb98ba2f3cd2e5c7c171c08f8e79f29f85813a4348a7

  • SHA512

    f1cf40d52008eb4d82d526089e8bd1bad3b972ffe0e23ce1dc049efe74cf229e1c61c4783c79dec1540a7f094a6ee47a2fa1df24f298895e299f4ecc4fbb8dca

  • SSDEEP

    196608:/Rf3bM7n7h8vzMSPwRHrPqM1P+BD0GXen6soD+smP+pZDuHd4ed5xHTUfTLbDppL:pI0ASPwNrPPMBDjxDlmmTjYRT+DX

Score
10/10

Malware Config

Signatures

  • Gigabud family
  • Gigabud payload 1 IoCs
  • GoldDigger payload 5 IoCs
  • Golddigger family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 19 IoCs

Files

  • 5c4882a7a66c0dfb2fe3814c08bf669e.bin
    .zip

    Password: infected

  • 8e8e4472aac3ecc96dd5b8b6bbf8f7e4015fa763e12c4b51af38b5fdff4a0436.apk
    .apk android arch:arm arch:arm64

    Password: infected

    com.aa.bb

    eqetdhbk.hdwmofly.lbublzcp.ui.SplashActivity