General

  • Target

    8031c03fe33aafcba5e78ecead0af4e0.bin

  • Size

    11.8MB

  • MD5

    bda6a1b709cb35d1008ff5ecf7487e75

  • SHA1

    90244d791aa330a8cd36dfe4c04776ef06a52a80

  • SHA256

    8ad756b1de2e84f63a73947169687cf641714a6488c6682214f43589951a7364

  • SHA512

    eab6833b6f78ebf16c14da36423d940d38b81313a5313870640d719dbca4ed1d34fa8b3c8567494d94e9bf3bc03678345316d449a9e572368a6c97b3d7a3ea75

  • SSDEEP

    196608:gi7Wgua/w55xYwDIIxbPe6yOX/yIWyuh7vdwhqdqY6VKuOGpzCYi959h/8xWA:FChKgBQOX6+uhhIKQpzCLB/8xWA

Score
10/10

Malware Config

Signatures

  • Gigabud family
  • Gigabud payload 1 IoCs
  • GoldDigger payload 5 IoCs
  • Golddigger family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 19 IoCs

Files

  • 8031c03fe33aafcba5e78ecead0af4e0.bin
    .zip

    Password: infected

  • 782c6b2dad7cfc1f731c41653427e4d47f78a87f0ebc7041a8cc810204494c40.apk
    .apk android arch:arm arch:arm64

    Password: infected

    com.sextest.test

    slwbduut.albmlfwj.rglpkmoo.ui.SplashActivity