General
-
Target
a0c2671f650c0c513398ae285bd0aa8226f620eb7750b54513f7bc3fb9cc2b52.bin
-
Size
5.0MB
-
Sample
241108-2q8lka1glf
-
MD5
a13a2d591eedd4e738f533f9f485c81a
-
SHA1
ff3e24ec7cdd0d1ea3aba47a20ccea8523a8b4b7
-
SHA256
a0c2671f650c0c513398ae285bd0aa8226f620eb7750b54513f7bc3fb9cc2b52
-
SHA512
18591413d384818ca1ed3345c0d0841c59a2bfbea7f487d571ff36aaa0d4757224c4cb3e96fd2f319fc2cd74f72f5bd44b4f62a30b5c1409b136a0982445d5b6
-
SSDEEP
98304:3MqapZMg3WXUNlEN19i0w9+xGpusLnoivODzTPn5Dxvr1i7TVm:3MqaFkUNl5GxGBRqzJKVm
Static task
static1
Behavioral task
behavioral1
Sample
a0c2671f650c0c513398ae285bd0aa8226f620eb7750b54513f7bc3fb9cc2b52.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
a0c2671f650c0c513398ae285bd0aa8226f620eb7750b54513f7bc3fb9cc2b52.apk
Resource
android-x64-20240910-en
Malware Config
Extracted
godfather
https://t.me/akakemoraserak
Targets
-
-
Target
a0c2671f650c0c513398ae285bd0aa8226f620eb7750b54513f7bc3fb9cc2b52.bin
-
Size
5.0MB
-
MD5
a13a2d591eedd4e738f533f9f485c81a
-
SHA1
ff3e24ec7cdd0d1ea3aba47a20ccea8523a8b4b7
-
SHA256
a0c2671f650c0c513398ae285bd0aa8226f620eb7750b54513f7bc3fb9cc2b52
-
SHA512
18591413d384818ca1ed3345c0d0841c59a2bfbea7f487d571ff36aaa0d4757224c4cb3e96fd2f319fc2cd74f72f5bd44b4f62a30b5c1409b136a0982445d5b6
-
SSDEEP
98304:3MqapZMg3WXUNlEN19i0w9+xGpusLnoivODzTPn5Dxvr1i7TVm:3MqaFkUNl5GxGBRqzJKVm
-
GodFather
GodFather is an Android banking trojan targeting Turkish users first seen in March 2022.
-
Godfather family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-