Behavioral task
behavioral1
Sample
ee50e49014fb0832ae2bc1ff6cc54340db3dcbf0c2a27aab38271881b203b7a3.apk
Resource
android-x64-20240624-en
0 signatures
150 seconds
General
-
Target
ee50e49014fb0832ae2bc1ff6cc54340db3dcbf0c2a27aab38271881b203b7a3.zip
-
Size
10.7MB
-
MD5
6e7ed12a99f97fb44b4a72c85d0ab68b
-
SHA1
02f32d645bb721d2931adc1c8a485df604959b5d
-
SHA256
21027c2fc270c7051a38f5d0b3fec028e38cf35479428e2268cba5a4a7ccc09f
-
SHA512
90cccae4b8471af567ba74d8a0308137fbd088d9ab780facad3fabc7e7ad8784367d92283958af1156ac2c568cd16b0ebb7f4fcefa745d8d22bc2013a45b3814
-
SSDEEP
196608:fRo3t1Y6Nn2TQE/s8iaiL8i6Aa+Pk1ZOpBahKxPs1l0C/vJNs+e/rajle1qmVEwB:po91Y6nuQIiiOq1ZOrahv0IvJNs+e/eI
Score
10/10
Malware Config
Signatures
-
GoldDigger payload 2 IoCs
resource yara_rule static1/unpack001/ee50e49014fb0832ae2bc1ff6cc54340db3dcbf0c2a27aab38271881b203b7a3.apk family_golddigger static1/unpack001/ee50e49014fb0832ae2bc1ff6cc54340db3dcbf0c2a27aab38271881b203b7a3.apk family_golddigger -
Golddigger family
-
Attempts to obfuscate APK file format
Applies obfuscation techniques to the APK format in order to hinder analysis
Files
-
ee50e49014fb0832ae2bc1ff6cc54340db3dcbf0c2a27aab38271881b203b7a3.zip.zip
Password: infected
-
ee50e49014fb0832ae2bc1ff6cc54340db3dcbf0c2a27aab38271881b203b7a3.apk.apk android arch:arm64 arch:arm
Password: infected