General

  • Target

    dropper.apk

  • Size

    4.7MB

  • MD5

    ffff634146506b11adae437103dc15fc

  • SHA1

    f70e96b4eb7d6dd2f1972ff1fb589097fd74844c

  • SHA256

    bc95e8c80931ff2205c89f7d78fc96a1d0dc7c6f3c6ccb68f7e926143aa6e42e

  • SHA512

    1a45fccbcee9a27bd2731ce99c00262808cf84521e7df3df87c3e3e89181404b869c4fe9a15ff05ff29f4894f8993fe1ec7758dd80e539fd96c45d428290445f

  • SSDEEP

    98304:i3mUMdkaoLKauoeQtcPHeXqmr4fgfVeXwTjZn0Bft2n:i3mUEpauoeQ4HCxUfIbTjZo12n

Score
10/10

Malware Config

Signatures

  • TgToxic payload 1 IoCs
  • TgToxic_v2 payload 1 IoCs
  • Tgtoxic family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • dropper.apk
    .apk android

    com.mem.installdropsession

    np.൉


  • base.apk
    .apk android

    com.example.mysoul

    com.example.mysoul.VdpuhpqbuChykVqywp


Android Permissions

dropper.apk

Permissions

android.permission.INTERNET

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REORDER_TASKS

android.permission.GET_PACKAGE_SIZE

android.permission.QUERY_ALL_PACKAGES

android.permission.GET_INSTALLED_APPS