Behavioral task
behavioral1
Sample
ecc66932f774a432d25a4ed4cc0dfe2a24c3931ef267a3040044bf75bf810aa7.apk
Resource
android-x86-arm-20240624-en
0 signatures
150 seconds
General
-
Target
ecc66932f774a432d25a4ed4cc0dfe2a24c3931ef267a3040044bf75bf810aa7.apk
-
Size
18.0MB
-
MD5
8b502fc6838010f959e163ffd18209ce
-
SHA1
c33f4765fa1a0c779d94469b63a23cd85d094194
-
SHA256
ecc66932f774a432d25a4ed4cc0dfe2a24c3931ef267a3040044bf75bf810aa7
-
SHA512
0eb8bb990447ded7229dbb93ac3577a38ae6611695476527ff712d33d7e3679f52bdf4f2f44d599c5405629c237f97c75e78fea698b3321175cf785c430cbf4a
-
SSDEEP
196608:4h61YAk7TXv5KL35FWVEGZ3s8sIJYggkHQuwvRt8URBOw6d+ZQIPBrjMFPn26JPl:w5AkHf8byAI+ggkRwQUjMZRh0cEjFxX+
Score
10/10
Malware Config
Signatures
-
GoldDigger payload 2 IoCs
resource yara_rule sample family_golddigger sample family_golddigger -
Golddigger family
-
Attempts to obfuscate APK file format
Applies obfuscation techniques to the APK format in order to hinder analysis
Files
-
ecc66932f774a432d25a4ed4cc0dfe2a24c3931ef267a3040044bf75bf810aa7.apk.apk android arch:arm arch:arm64
Password: infected