Analysis
-
max time kernel
133s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
09-11-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
Resource
android-x64-20240624-en
General
-
Target
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08.apk
-
Size
4.8MB
-
MD5
4f2da7f59fb05d5fd6f0cc60ceea644c
-
SHA1
425a1002be3fd68c5178dc84200c101b1af1b34b
-
SHA256
6232b30398726350b704f677b2f5d5affa55dc04e0964f3e3dcdb3b41ea62c08
-
SHA512
b3a1a92d8de5d716ec7821a8165a41e8c6cb932c770e4b7da434946a12237fa069f0a24ce269def2024de644948f0baaf3a5fbbf543d13e488c4623f1fd80d4f
-
SSDEEP
98304:ZlqBwojwhlJUORjOe2CspgFi6SW35zluCj55TBHUGNgMhZfkGGpO6LF:uglA1p96SWnukTB0GNgMshLF
Malware Config
Extracted
godfather
https://t.me/fakapaparamokas
Signatures
-
GodFather
GodFather is an Android banking trojan targeting Turkish users first seen in March 2022.
-
Godfather family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.prizeable.ldxioc pid process /data/user/0/com.prizeable.ldx/app_mesh/foB.json 4501 com.prizeable.ldx -
Acquires the wake lock 1 IoCs
Processes:
com.prizeable.ldxdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.prizeable.ldx -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.prizeable.ldxioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.prizeable.ldx -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.prizeable.ldxdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.prizeable.ldx
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5f7a50e10acc10cf7bf0c2b99699da83f
SHA1aab764adcf304414841132bdea32628c48fa8fb5
SHA256703f78d35240b846caac0a3c3a40043035846f13ae772c4974a02adc6d5a4f5c
SHA512e75da50d462b99e697687a0e01612fc256bc2f089084c07cc4317f6eab42822b7366d64d51c5ec5b40248a61624cd5e8853d9d4a35134b097fc2448288354c21
-
Filesize
2.3MB
MD55c92094bb2fcef05fe149f72fc2cd929
SHA1a54b1fff30626901d9df1fd74058d20159b41b88
SHA256864726f4967bd573f017264a694b9017e7ef06b25e0392fdf9cb678f6a784942
SHA512373e48ffaa442b757492ff6efcf8a07cfe2098852eab216dea9222dcf654107dae624138ec4932394fb7baba055057112b93be5bbed9c1a7c71ebb72204d62a8
-
Filesize
4KB
MD55c29d82203d6f28b06baa75f796840d2
SHA13efd91b60b8b004c297aa2939a5c17e9da27beca
SHA25631d6fe6b82a6628f47cefea62af6d6be723698ac822f7b738de716d7c903f21f
SHA512849462a2c8aab1b70be2e2d98414cef0d5afec2db64167bac43f808fa932192af4103172851c64df55518ef1ef3b8fa34db1ec6d88a6f74dc3deecfef123b3e8
-
Filesize
6.2MB
MD51388e4ae7ae7231f3a90acdbbd2d9a5d
SHA19006c44d06d5b875659e934e7d5cb1fb17b17464
SHA256c7e6ae1df6cbc565d7e642481e8cfb4ae0c44f86265a45deacf9c62914c59825
SHA5125c55b770380b1aeb5a939afaa9cf88dc7e890f6e11735f78a3b99a14357929b5867fc0595692c5c1da0d6ae3620110326a7089b54f55f2a59f1102d95537b63a