Analysis
-
max time kernel
132s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
08-11-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
-
Size
4.8MB
-
MD5
4f2da7f59fb05d5fd6f0cc60ceea644c
-
SHA1
425a1002be3fd68c5178dc84200c101b1af1b34b
-
SHA256
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08
-
SHA512
b3a1a92d8de5d716ec7821a8165a41e8c6cb932c770e4b7da434946a12237fa069f0a24ce269def2024de644948f0baaf3a5fbbf543d13e488c4623f1fd80d4f
-
SSDEEP
98304:ZlqBwojwhlJUORjOe2CspgFi6SW35zluCj55TBHUGNgMhZfkGGpO6LF:uglA1p96SWnukTB0GNgMshLF
Malware Config
Extracted
godfather
https://t.me/fakapaparamokas
Signatures
-
GodFather
GodFather is an Android banking trojan targeting Turkish users first seen in March 2022.
-
Godfather family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.prizeable.ldxioc pid process /data/user/0/com.prizeable.ldx/app_mesh/foB.json 4506 com.prizeable.ldx -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.prizeable.ldxdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.prizeable.ldx Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.prizeable.ldx -
Acquires the wake lock 1 IoCs
Processes:
com.prizeable.ldxdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.prizeable.ldx -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.prizeable.ldxioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.prizeable.ldx -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.prizeable.ldxdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.prizeable.ldx
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5f7a50e10acc10cf7bf0c2b99699da83f
SHA1aab764adcf304414841132bdea32628c48fa8fb5
SHA256703f78d35240b846caac0a3c3a40043035846f13ae772c4974a02adc6d5a4f5c
SHA512e75da50d462b99e697687a0e01612fc256bc2f089084c07cc4317f6eab42822b7366d64d51c5ec5b40248a61624cd5e8853d9d4a35134b097fc2448288354c21
-
Filesize
2.3MB
MD55c92094bb2fcef05fe149f72fc2cd929
SHA1a54b1fff30626901d9df1fd74058d20159b41b88
SHA256864726f4967bd573f017264a694b9017e7ef06b25e0392fdf9cb678f6a784942
SHA512373e48ffaa442b757492ff6efcf8a07cfe2098852eab216dea9222dcf654107dae624138ec4932394fb7baba055057112b93be5bbed9c1a7c71ebb72204d62a8
-
Filesize
4KB
MD5376ba258695d6c5aca83059c004a1eac
SHA15ee56aac7c0f5126619b15a021e8057b6073cf60
SHA2565aa4c16acc478b9a6a742ad6ba7c2ea7e2022f091aea7542d1b15be7915dc42d
SHA5124867ba39595e5e46f4d3289682e749e2209a7e3bd25cceea3beb7a10149a94438cdf16d36ae7673f682843f6a89c2511e39ae136ed26fa2177ebfe06f2bd7994
-
Filesize
6.2MB
MD51388e4ae7ae7231f3a90acdbbd2d9a5d
SHA19006c44d06d5b875659e934e7d5cb1fb17b17464
SHA256c7e6ae1df6cbc565d7e642481e8cfb4ae0c44f86265a45deacf9c62914c59825
SHA5125c55b770380b1aeb5a939afaa9cf88dc7e890f6e11735f78a3b99a14357929b5867fc0595692c5c1da0d6ae3620110326a7089b54f55f2a59f1102d95537b63a