General
-
Target
b60d7d8d735b94361931d60d903b262142acc50dd867815110b3bd68a854f459.bin
-
Size
3.9MB
-
Sample
250121-1zpdlstndl
-
MD5
afbe5fef700fd18136d1810d86a9d00c
-
SHA1
d1c9310005cace73b8d5860188a8733e0afd984e
-
SHA256
b60d7d8d735b94361931d60d903b262142acc50dd867815110b3bd68a854f459
-
SHA512
71143dbf2a259a4718e5629a1e7e76de250fceead76e0001e681e7dbc5a14b02dd1a388563515bb2bd9d2400a4715a5fac224aac32e2f40dd7b31ee79b14494f
-
SSDEEP
98304:I8NIS6rtk5TQmTHz0eQSMA+75RUqlqX0wtMCsfzw4U:zNIbrtw0mTHIeQSYY1JTsU4U
Behavioral task
behavioral1
Sample
b60d7d8d735b94361931d60d903b262142acc50dd867815110b3bd68a854f459.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b60d7d8d735b94361931d60d903b262142acc50dd867815110b3bd68a854f459.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b60d7d8d735b94361931d60d903b262142acc50dd867815110b3bd68a854f459.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
godfather
https://t.me/trinomazkonera
Targets
-
-
Target
b60d7d8d735b94361931d60d903b262142acc50dd867815110b3bd68a854f459.bin
-
Size
3.9MB
-
MD5
afbe5fef700fd18136d1810d86a9d00c
-
SHA1
d1c9310005cace73b8d5860188a8733e0afd984e
-
SHA256
b60d7d8d735b94361931d60d903b262142acc50dd867815110b3bd68a854f459
-
SHA512
71143dbf2a259a4718e5629a1e7e76de250fceead76e0001e681e7dbc5a14b02dd1a388563515bb2bd9d2400a4715a5fac224aac32e2f40dd7b31ee79b14494f
-
SSDEEP
98304:I8NIS6rtk5TQmTHz0eQSMA+75RUqlqX0wtMCsfzw4U:zNIbrtw0mTHIeQSYY1JTsU4U
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-