General

  • Target

    dropper.apk

  • Size

    5.4MB

  • MD5

    9e7d671e6d45dc805d846c1bf3ab60aa

  • SHA1

    a2aa5f3258b4ed4c0e9189dca411bf2ded23e426

  • SHA256

    e2840f0ccb7f2d1f719eb2bef275efe19b1b76af86f8f504804c6b42aa1b678d

  • SHA512

    d679eb8711ceb69615f277b30e8d85766a0840746fe4b9b42dc587686f367de54cd4ab3257df0309807531b5b5721b8108dd7da7918274f7b97f2d1dadd87dda

  • SSDEEP

    98304:EXVSsuxGCamIBlOMdY23SHQtuXKUIIa9OiEbBrb1zyVZPlOxS:EXKlamcHkQA6N9EbRqn

Score
10/10

Malware Config

Signatures

  • TgToxic payload 1 IoCs
  • TgToxic_v2 payload 1 IoCs
  • Tgtoxic family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • dropper.apk
    .apk android

    com.mem.installdropsession

    com.mem.installdropsession.௄


  • base.apk
    .apk android

    com.example.mysoul

    com.example.mysoul.YkhhzkkMkmvrzne


Android Permissions

dropper.apk

Permissions

android.permission.REQUEST_INSTALL_PACKAGES