General

  • Target

    dropper.apk

  • Size

    4.7MB

  • MD5

    72a00302ea4abff775a0f5d64aa163d5

  • SHA1

    a60c8d0605986f7069e36d637cbd001309801cb0

  • SHA256

    94694e56c6d22a0115a3dc615597f5e24a5f844fb5a250a4b71f673cfc2d0d02

  • SHA512

    30bd913dea1040f43890de4580c2ca6e2381fab87f2b962f38fd94a5184cea56c04fa29242c42bcf774120a97069dcc61fb1036f085d192f6428b869a6315985

  • SSDEEP

    98304:U3mUMdkaoLKauoycvBMORRsc96MmXXYWL9RtNFk6P+xvDfDdI:U3mUEpauoFZf0c9pYRRtNH6lI

Score
10/10

Malware Config

Signatures

  • TgToxic payload 1 IoCs
  • TgToxic_v2 payload 1 IoCs
  • Tgtoxic family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • dropper.apk
    .apk android

    com.mem.installdropsession

    np.൉


  • base.apk
    .apk android

    com.example.mysoul

    com.example.mysoul.VdpuhpqbuChykVqywp


Android Permissions

dropper.apk

Permissions

android.permission.INTERNET

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REORDER_TASKS

android.permission.GET_PACKAGE_SIZE

android.permission.QUERY_ALL_PACKAGES

android.permission.GET_INSTALLED_APPS