General

  • Target

    e40dc70d94e13e7fc1a58c9b940591bc01c1c37641f2ee61737c7625aa467c02.zip

  • Size

    4.1MB

  • MD5

    0e51b9cfa9eb60e18a8cc627fccc9d3b

  • SHA1

    289de303863cce38ed2baa63405eba5f169a8bbc

  • SHA256

    42dbab5c073b5a9f6989c7ef67349a361a1d40e9dea93833362dbc50900ddbc6

  • SHA512

    69dda0c8c886437c4c7c84fdd7bc7f611b039897a6e9d6cd98d70f31d5cfd134be134e35254e0463203965bad72dcc1c4f822502627a9ebcfb300ed0748d7019

  • SSDEEP

    98304:9rU6BpXaJp6dBrQjOo0067b5PxBAmYKQRFjrT8l2VnNiUSSaU2g+:9bPXauCzzob5PAmYKgVS2VNiCZp+

Score
10/10

Malware Config

Signatures

  • TgToxic payload 1 IoCs
  • TgToxic_v2 payload 1 IoCs
  • Tgtoxic family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • e40dc70d94e13e7fc1a58c9b940591bc01c1c37641f2ee61737c7625aa467c02.zip
    .zip

    Password: infected

  • e40dc70d94e13e7fc1a58c9b940591bc01c1c37641f2ee61737c7625aa467c02.apk
    .apk android

    Password: infected

    com.mem.installdropsession

    np.൉


  • base.apk
    .apk android arch:arm64 arch:arm

    Password: infected

    com.example.mysoul

    com.example.mysoul.VdpuhpqbuChykVqywp