General

  • Target

    6270c107c32174763caf5ee3013abb96.bin

  • Size

    13.4MB

  • MD5

    14be9ac5aad597ad129e5ebde3ee3c7a

  • SHA1

    f3f3ee4e6596d2637fb1acf606c7d5febce4deee

  • SHA256

    c07fac1761889432546b464bc97c892ce7219b90c88e2e7cccd89bbd49893cda

  • SHA512

    d914cdc49f3851779d88962915e8a575ce16e92265632f8469ae652c2a711c8cba503cde506893a8b13836eedcbc06521fc0360fa1ec87b8246b6cfe4c19d262

  • SSDEEP

    196608:MkSE2Z3qGdVRP4FsSpY56AOhM+XI7O5UwwqW0cViFcMG+l7I5ym07ZYBVRKxPs4l:MQ4jdVRP4FsSm6dlwkmYGHA9YBVRKxEg

Score
10/10

Malware Config

Signatures

  • Gigabud family
  • Gigabud payload 1 IoCs
  • GoldDigger payload 5 IoCs
  • Golddigger family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 18 IoCs

Files

  • 6270c107c32174763caf5ee3013abb96.bin
    .zip

    Password: infected

  • 9e00e23077fd90ab4fc5cd98375591161bf8508fc959265605c47b10efa2a73d.apk
    .apk android arch:arm arch:arm64

    Password: infected

    com.aa.bb

    cmuydpxi.hwupsjzv.qzxdepji.ui.SplashActivity