General
-
Target
589b49f391a1beef3445016b07c7b7be37d97ea619b7764d2dbf822d6d8ecef9
-
Size
11.7MB
-
Sample
241120-qn33hsxmhs
-
MD5
0ab33809610af8104d6659e15232dadd
-
SHA1
277bce6306e02d497245660185926b2eaa535473
-
SHA256
589b49f391a1beef3445016b07c7b7be37d97ea619b7764d2dbf822d6d8ecef9
-
SHA512
21e7fcceed7efaa3225cf2bc463aa78c3c193532c0ed6ccaf486e748da5ed4fada0949297e14a4a384e206bf350d47f977f832977246f281b5887d35092134f3
-
SSDEEP
196608:9WW7aLEMaQrxCkwMhIgZ/uzLM90qrtPMRffVvbIB+fbxqffsedyD1j2YDjVoyy:9WW7F1Qr0kwANuPFqrZMRVzIADAnsQyY
Behavioral task
behavioral1
Sample
589b49f391a1beef3445016b07c7b7be37d97ea619b7764d2dbf822d6d8ecef9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
589b49f391a1beef3445016b07c7b7be37d97ea619b7764d2dbf822d6d8ecef9.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
godfather
https://t.me/mavirotekiromi
Targets
-
-
Target
589b49f391a1beef3445016b07c7b7be37d97ea619b7764d2dbf822d6d8ecef9
-
Size
11.7MB
-
MD5
0ab33809610af8104d6659e15232dadd
-
SHA1
277bce6306e02d497245660185926b2eaa535473
-
SHA256
589b49f391a1beef3445016b07c7b7be37d97ea619b7764d2dbf822d6d8ecef9
-
SHA512
21e7fcceed7efaa3225cf2bc463aa78c3c193532c0ed6ccaf486e748da5ed4fada0949297e14a4a384e206bf350d47f977f832977246f281b5887d35092134f3
-
SSDEEP
196608:9WW7aLEMaQrxCkwMhIgZ/uzLM90qrtPMRffVvbIB+fbxqffsedyD1j2YDjVoyy:9WW7F1Qr0kwANuPFqrZMRVzIADAnsQyY
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
1System Checks
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
1System Network Configuration Discovery
2