General
-
Target
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.bin
-
Size
4.8MB
-
Sample
241108-3dg4hsscnn
-
MD5
4f2da7f59fb05d5fd6f0cc60ceea644c
-
SHA1
425a1002be3fd68c5178dc84200c101b1af1b34b
-
SHA256
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08
-
SHA512
b3a1a92d8de5d716ec7821a8165a41e8c6cb932c770e4b7da434946a12237fa069f0a24ce269def2024de644948f0baaf3a5fbbf543d13e488c4623f1fd80d4f
-
SSDEEP
98304:ZlqBwojwhlJUORjOe2CspgFi6SW35zluCj55TBHUGNgMhZfkGGpO6LF:uglA1p96SWnukTB0GNgMshLF
Static task
static1
Behavioral task
behavioral1
Sample
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
godfather
https://t.me/fakapaparamokas
Targets
-
-
Target
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.bin
-
Size
4.8MB
-
MD5
4f2da7f59fb05d5fd6f0cc60ceea644c
-
SHA1
425a1002be3fd68c5178dc84200c101b1af1b34b
-
SHA256
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08
-
SHA512
b3a1a92d8de5d716ec7821a8165a41e8c6cb932c770e4b7da434946a12237fa069f0a24ce269def2024de644948f0baaf3a5fbbf543d13e488c4623f1fd80d4f
-
SSDEEP
98304:ZlqBwojwhlJUORjOe2CspgFi6SW35zluCj55TBHUGNgMhZfkGGpO6LF:uglA1p96SWnukTB0GNgMshLF
-
GodFather
GodFather is an Android banking trojan targeting Turkish users first seen in March 2022.
-
Godfather family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-