General

  • Target

    77c2f98646578536a128002614f771db9803f547ea9f2cf06f41fec132105cf5.zip

  • Size

    15.8MB

  • MD5

    47b47388e053af231005c3c8aab305af

  • SHA1

    4a7c3a1398b2d4e876b23da98ed75cb383c05b2f

  • SHA256

    2b17df948efd87c9cb4d14c4450adfd6c1151dfbed067e1ccb87552a34e0f300

  • SHA512

    ebc16db4aca928f3ce9657f2990363d42fe087599c8b5f2eb565b0e6fece96c2f96e31753eed44b2d85ae2f45c805249f9aa6cb3b77d32369bf62bdf915768d3

  • SSDEEP

    393216:NazxtqXui2naBXeC/GhyzK5HScqpFjabIZGDu0lYjqjs6:EzCunuOCOhyuScqpFjWIP1ujs6

Score
10/10

Malware Config

Signatures

  • GoldDigger payload 4 IoCs
  • Golddigger family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 19 IoCs

Files

  • 77c2f98646578536a128002614f771db9803f547ea9f2cf06f41fec132105cf5.zip
    .zip

    Password: infected

  • 77c2f98646578536a128002614f771db9803f547ea9f2cf06f41fec132105cf5.apk
    .apk android arch:arm64 arch:arm

    Password: infected

    com.sextest.test

    aAUHiRzv.KwsLIkUq.MDiwXcnm.ui.SplashActivity