General
-
Target
18f5f817288f48fa4285e916a2ee3ecf78591b46eb341f5ab6ca8805bfcd502c.bin
-
Size
3.9MB
-
Sample
250121-1z443atnfk
-
MD5
c5fe2c9a190f00a492120278104f011a
-
SHA1
b9dce8c9c890746ffdd63a2760d087327ca074fd
-
SHA256
18f5f817288f48fa4285e916a2ee3ecf78591b46eb341f5ab6ca8805bfcd502c
-
SHA512
b0f5114cf1272d3093532f9e91425156320240561c87668dc1e29b90097d956666a10d08b6c8c50196721b947e274f0095982d8ffe389b6b2aab015631ffe590
-
SSDEEP
98304:/v6ufpJO5RdxBmOtOAenID1PQl83kgPRM+jLVv:/vBmRdxUOtOAenIDuBQMgVv
Behavioral task
behavioral1
Sample
18f5f817288f48fa4285e916a2ee3ecf78591b46eb341f5ab6ca8805bfcd502c.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
18f5f817288f48fa4285e916a2ee3ecf78591b46eb341f5ab6ca8805bfcd502c.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
18f5f817288f48fa4285e916a2ee3ecf78591b46eb341f5ab6ca8805bfcd502c.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
godfather
https://t.me/trinomazkonera
Targets
-
-
Target
18f5f817288f48fa4285e916a2ee3ecf78591b46eb341f5ab6ca8805bfcd502c.bin
-
Size
3.9MB
-
MD5
c5fe2c9a190f00a492120278104f011a
-
SHA1
b9dce8c9c890746ffdd63a2760d087327ca074fd
-
SHA256
18f5f817288f48fa4285e916a2ee3ecf78591b46eb341f5ab6ca8805bfcd502c
-
SHA512
b0f5114cf1272d3093532f9e91425156320240561c87668dc1e29b90097d956666a10d08b6c8c50196721b947e274f0095982d8ffe389b6b2aab015631ffe590
-
SSDEEP
98304:/v6ufpJO5RdxBmOtOAenID1PQl83kgPRM+jLVv:/vBmRdxUOtOAenIDuBQMgVv
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-