Examining New DawDropper Banking Dropper and DaaS on the Dark Web
In this blog post, we discuss the technical details of a new banking dropper that we have dubbed DawDropper, give a brief history of banking trojans released in early 2022 that use malicious droppers, and elaborate on cybercriminal activities related to DaaS in the deep web.
By Trend Micro Mobile Team
Malicious actors have been surreptitiously adding a growing number of banking trojans to Google Play Store via malicious droppers this year, proving that such a technique is effective in evading detection. Additionally, because there is a high demand for novel ways to distribute mobile malware, several malicious actors claim that their droppers could help other cybercriminals disseminate their malware on Google Play Store, resulting in a dropper-as-a-service (DaaS) model.
In the latter part of 2021, we found a malicious campaign that uses a new dropper variant that we have dubbed as DawDropper. Under the guise of several Android apps such as Just In: Video Motion, Document Scanner Pro, Conquer Darkness, simpli Cleaner, and Unicc QR Scanner, DawDropper uses Firebase Realtime Database, a third-party cloud service, to evade detection and dynamically obtain a payload download address. It also hosts malicious payloads on GitHub. As of reporting, these malicious apps are no longer available on Google Play Store.
We explore the technical details of the new DawDropper dropper, look at the brief history of banking trojans released in early 2022 that use malicious droppers, and discuss cybercriminal activities related to DaaS in the deep web in this entry.
DawDropper technical analysis
Based on our observation, DawDropper has variants that drop four types of banking trojans, including Octo, Hydra, Ermac, and TeaBot. All DawDropper variants use a Firebase Realtime Database, a legitimate cloud-hosted NoSQL database for storing data, as their command-and-control (C&C) server and host malicious payloads on GitHub.
A similarity between Clast82 and DawDropper
Interestingly, we found that another dropper called Clast82, which was reported by CheckPoint Research in March 2021, also uses Firebase Realtime Database as a C&C server.
The DawDropper C&C server returns data similar to Clast82 data:
The Octo payload
DawDropper’s malicious payload belongs to the Octo malware family, which is a modular and multistage malware that is capable of stealing banking information, intercepting text messages, and hijacking infected devices. Octo is also known as Coper, and it has been historically used to target Colombian online banking users.
Based on our analysis, DawDropper’s Octo malware payload is similar to previously reported variants. The package uses programming language keywords to obfuscate malicious functionalities.
Once the Octo malware is successfully launched in the victim’s device and gains primary permissions, it will keep the device awake and register a scheduled service to collect and upload sensitive data to its C&C server. It also uses virtual network computing (VNC) to record a user's screen, including sensitive information such as banking credentials, email addresses and passwords, and PINs. The malware also causes a user’s screen to turn black by turning the device’s backlight off and turns off the device’s sound to hide malicious behavior.
The malware can also disable Google Play Protect (which goes through a device’s apps and checks for malicious behavior) and collects user data, including an infected mobile phone’s Android ID, contact list, installed apps, and even text messages.
A brief history of banking droppers in early 2022
To better understand this trend of banking trojans being distributed via malicious droppers, we must look back at how droppers have been popping up on Google Play Store since the beginning of 2022, analyze how each of these droppers vary from one another and evolve, and learn how cybercriminals are disseminating them.
Main differences among banking droppers
Although these banking droppers have the same main objective — to distribute and install malware on victims’ devices — we have observed that there are marked differences in how these banking droppers implement their malicious routines. For example, the banking droppers that were launched earlier this year have hard-coded payload download addresses. Meanwhile, the banking droppers that have been recently launched tend to hide the actual payload download address, at times use third-party services as their C&C servers, and use third-party services such as GitHub to host malicious payloads.
Banking dropper name and release date | Dynamic address | Third-party storage | Encrypted payload |
Jan 12, 2022 (com.privacy.account.safetyapp) |
✓ | ||
Jan 14, 2022 (com.pagnotto28.sellsourcecode.supercleaner) |
✓ | ||
Octo dropper (Gymdrop dropper) Feb 17, 2022 (com.moh.screen) Feb. 6, 2022 (Vizeeva.fast.cleaner) |
✓ | ||
Ermac dropper (DawDropper) Mar 25, 2022 (com.qaz.universalsaver) |
✓ (Firebase Realtime Database) |
✓ (GitHub) |
|
TeaBot dropper Apr 3, 2022 (com.zynksoftware.docuscanapp) Feb 11, 2022 (com.scanner.buratoscanner) |
✓ (GitHub) |
✓ (GitHub) |
|
Hydra dropper (DawDropper) Apr 23, 2022 (com.casualplay.leadbro) |
✓ (Firebase Realtime Database) |
✓ (GitHub) |
|
Hydra dropper (Gymdrop dropper) May 30, 2022 (com.anatolijserba.docscanner) |
✓ | ||
Octo dropper (DawDropper) Jun 28, 2022 (com.scando.qukscanner) |
✓ (Firebase Realtime Database) |
✓ (GitHub) |
The Vultur dropper (SHA-256: 00a733c78f1b4d4f54cf06a0ea8cc33604512d6032ef4ef9114c89c700bfafcf), also known as Brunhilda was first reported as a DaaS at the end of 2020. In January 2022, we observed that it directly downloads the malicious payload on the infected device and has its own method to decrypt the malicious payload.
The Sharkbot dropper (SHA-256: 7f55dddcfad05403f71580ec2e5acafdc8c9555e72f724eb1f9e37bf09b8cc0c), which was also released in January 2022, has a unique behavior: It not only acts as a dropper but also requests for accessibility permissions and responds with all of the user interface (UI) events of the infected device.
Meanwhile, the TeaBot dropper, released in April 2022, uses GitHub to host its malware payload. However, TeaBot uses another GitHub repository to get the download address, in contrast to DawDropper, which uses a Firebase Realtime Database.
DaaS dark web activities
In our investigation of banking trojans using droppers, we observed that one of the droppers that were first reported in 2021, Gymdrop, is connected to a management panel (trackerpdfconnect[.]com and smartscreencaster[.]online) that cybercriminals can use to manage both the dropper and the payload. We also found Gymdrop being advertised in a dark web forum as a typical DaaS.
Conclusion and security recommendations
Cybercriminals are constantly finding ways to evade detection and infect as many devices as possible. In a half-year span, we have seen how banking trojans have evolved their technical routines to avoid being detected, such as hiding malicious payloads in droppers. As more banking trojans are made available via DaaS, malicious actors will have an easier and more cost-effective way of distributing malware disguised as legitimate apps. We foresee that this trend will continue and more banking trojans will be distributed on digital distribution services in the future.
To avoid falling prey to malicious apps, users should adopt the following security best practices:
- Always check app reviews to see if users voice out unusual concerns or negative experiences.
- Apply due diligence when looking into app developers and publishers. Avoid downloading apps from suspicious-looking websites.
- Avoid installing apps from unknown sources.
Mobile users can help minimize the threats posed by these fraudulent apps by using Trend Micro Mobile Security Solutions to scan mobile devices in real time and on demand to detect malicious apps or malware to block or delete them. These apps are available for both Android and iOS.
Indicators of compromise (IOCs)
DawDropper
SHA-256 |
Package name |
Release date |
Detection name |
C&C server |
Payload address |
Payload family |
022a01566d6033f6d90ab182c4e69f80a3851565aaaa386c8fa1a9435cb55c91 |
com.caduta.aisevsk |
05/01/2021 |
AndroidOS_DawDropper.HRX |
call-recorder-66f03-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/uliaknazeva888/qs/raw/main/1.apk |
Octo |
e1598249d86925b6648284fda00e02eb41fdcc75559f10c80acd182fd1f0e23a |
com.vpntool.androidweb |
11/07/2021 |
AndroidOS_DawDropper.HRXA |
rooster-945d8-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/butcher65/test/raw/main/golgofan.apk |
Hydra |
8fef8831cbc864ffe16e281b0e4af8e3999518c15677866ac80ffb9495959637 |
com.j2ca.callrecorder |
11/11/2021 |
AndroidOS_DawDropper.HRXA |
call-recorder-ad77f-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/butcher65/test/raw/main/gala.apk |
Octo |
05b3e4071f62763b3925fca9db383aeaad6183c690eecbbf532b080dfa6a5a08 |
com.codeword.docscann |
11/21/2021 |
AndroidOS_DawDropper.HRXA |
doc-scanner-cff1d-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/lotterevich/lott/raw/main/maina.apk |
TeaBot |
f4611b75113d31e344a7d37c011db37edaa436b7d84ca4dfd77a468bdeff0271 |
com.virtualapps.universalsaver |
12/09/2021 |
AndroidOS_DawDropper.HRXA |
universalsaverpro-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/uliaknazeva888/qs/raw/main/1.apk |
Octo |
a1298cc00605c79679f72b22d5c9c8e5c8557218458d6a6bd152b2c2514810eb |
com.techmediapro.photoediting |
01/04/2022 |
AndroidOS_DawDropper.HRXA |
eaglephotoeditor-2d4e5-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/butcher65/test/raw/main/lolipop.apk |
Hydra |
eb8299c16a311ac2412c55af16d1d3821ce7386c86ae6d431268a3285c8e81fb |
com.chestudio.callrecorder |
01/2022 |
AndroidOS_DawDropper.HRXA |
call-recorder-pro-371bc-default-rtdb.firebaseio.com |
hxxps://github.com/sherrytho/test/raw/main/golgol.apk
|
Hydra |
d5ac8e081298e3b14b41f2134dae68535bcf740841e75f91754d3d0c0814ed42 |
com.casualplay.leadbro |
04/23/2022 |
AndroidOS_DawDropper.HRXA |
loader-acb47-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/briangreen7667/2705/raw/main/addon2.apk |
Hydra |
b4bd13770c3514596dd36854850a9507e5734374083a0e4299c697b6c9b9ec58 |
com.utilsmycrypto.mainer |
05/04/2022 |
AndroidOS_DawDropper.HRXA |
crypto-utils-l-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/asFirstYouSaid/test/raw/main/110.apk
hxxps://github.com/asFirstYouSaid/test/raw/main/SecureChat%20(1).apk |
Ermac |
77f226769eb1a886606823d5b7832d92f678f0c2e1133f3bbee939b256c398aa |
com.cleaner.fixgate |
05/14/2022 |
AndroidOS_DawDropper.HRXA |
fixcleaner-60e32-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/butcher65/test/raw/main/latte.apk |
Hydra |
5ee98b1051ccd0fa937f681889e52c59f33372ffa27afff024bb76d9b0446b8a |
com.olivia.openpuremind |
05/23/2022 |
AndroidOS_DawDropper.HRX |
crypto-sequence-default-rtdb[.]firebaseio.com |
N/A
|
N/A |
0ebcf3bce940daf4017c85700ffc72f6b3277caf7f144a69fbfd437d1343b4ab |
com.myunique.sequencestore |
2022/05/31 |
AndroidOS_DawDropper.HRX |
coin-flow-a179b-default-rtdb.firebaseio.com
|
N/A
|
N/A |
2113451a983916b8c7918c880191f7d264f242b815b044a6351c527f8aeac3c8 |
com.flowmysequto.yamer |
05/2022 |
AndroidOS_DawDropper.HRX |
incrypted-app-default-rtdb.firebaseio.com
|
N/A
|
N/A |
71c44a78cd77a8f5767096f268c3193108ac06ff3779c65e78bc879d3b0ff11d |
com.qaz.universalsaver |
05/2022 |
AndroidOS_DawDropper.HRX |
saver-9a43a-default-rtdb[.]firebaseio.com |
hxxps://raw.githubusercontent.com/asFirstYouSaid/awdaw/main/Xnode_new.apk
hxxps://raw.githubusercontent.com/asFirstYouSaid/test/main/GoogleMaps%20(2)_obf.apk |
Ermac |
9b2064f8808d3aaa2d3dc9f5c7ee0775b29e29df3a958466a8953f148b702461 |
com.luckyg.cleaner |
06/02/2022 |
AndroidOS_DawDropper.HRXA |
lucky-cleaner-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/gohhas/gate/raw/main/live.apk |
Octo |
ff8110883628f8d926588c0b7aedae8841df989d50f32c140d88f1105d1d3e02 |
com.scando.qukscanner |
06/28/2022 |
AndroidOS_DawDropper.HRX |
cleaner-f40c4-default-rtdb[.]firebaseio[.]com |
hxxps://raw.githubusercontent.com/k6062019/qq/main/clown.apk |
Octo |
02499a198a8be5e203b7929287115cc84d286fc6afdb1bc84f902e433a7961e4 |
com.qrdscannerratedx |
07/01/2022 |
AndroidOS_DawDropper.HRX |
Qrscanner-f6d8d-default-rtdb.firebaseio.com |
hxxps://raw.githubusercontent.com/k6062019/qq/main/clown.apk |
Octo |
|
||||||
022a01566d6033f6d90ab182c4e69f80a3851565aaaa386c8fa1a9435cb55c91 |
com.caduta.aisevsk |
05/01/2021 |
AndroidOS_DawDropper.HRX |
call-recorder-66f03-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/uliaknazeva888/qs/raw/main/1.apk |
Octo |
e1598249d86925b6648284fda00e02eb41fdcc75559f10c80acd182fd1f0e23a |
com.vpntool.androidweb |
11/07/2021 |
AndroidOS_DawDropper.HRXA |
rooster-945d8-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/butcher65/test/raw/main/golgofan.apk |
Hydra |
8fef8831cbc864ffe16e281b0e4af8e3999518c15677866ac80ffb9495959637 |
com.j2ca.callrecorder |
11/11/2021 |
AndroidOS_DawDropper.HRXA |
call-recorder-ad77f-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/butcher65/test/raw/main/gala.apk |
Octo |
05b3e4071f62763b3925fca9db383aeaad6183c690eecbbf532b080dfa6a5a08 |
com.codeword.docscann |
11/21/2021 |
AndroidOS_DawDropper.HRXA |
doc-scanner-cff1d-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/lotterevich/lott/raw/main/maina.apk |
TeaBot |
f4611b75113d31e344a7d37c011db37edaa436b7d84ca4dfd77a468bdeff0271 |
com.virtualapps.universalsaver |
12/09/2021 |
AndroidOS_DawDropper.HRXA |
universalsaverpro-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/uliaknazeva888/qs/raw/main/1.apk |
Octo |
a1298cc00605c79679f72b22d5c9c8e5c8557218458d6a6bd152b2c2514810eb |
com.techmediapro.photoediting |
01/04/2022 |
AndroidOS_DawDropper.HRXA |
eaglephotoeditor-2d4e5-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/butcher65/test/raw/main/lolipop.apk |
Hydra |
eb8299c16a311ac2412c55af16d1d3821ce7386c86ae6d431268a3285c8e81fb |
com.chestudio.callrecorder |
01/2022 |
AndroidOS_DawDropper.HRXA |
call-recorder-pro-371bc-default-rtdb.firebaseio.com |
hxxps://github.com/sherrytho/test/raw/main/golgol.apk
|
Hydra |
d5ac8e081298e3b14b41f2134dae68535bcf740841e75f91754d3d0c0814ed42 |
com.casualplay.leadbro |
04/23/2022 |
AndroidOS_DawDropper.HRXA |
loader-acb47-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/briangreen7667/2705/raw/main/addon2.apk |
Hydra |
b4bd13770c3514596dd36854850a9507e5734374083a0e4299c697b6c9b9ec58 |
com.utilsmycrypto.mainer |
05/04/2022 |
AndroidOS_DawDropper.HRXA |
crypto-utils-l-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/asFirstYouSaid/test/raw/main/110.apk
hxxps://github.com/asFirstYouSaid/test/raw/main/SecureChat%20(1).apk |
Ermac |
77f226769eb1a886606823d5b7832d92f678f0c2e1133f3bbee939b256c398aa |
com.cleaner.fixgate |
05/14/2022 |
AndroidOS_DawDropper.HRXA |
fixcleaner-60e32-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/butcher65/test/raw/main/latte.apk |
Hydra |
5ee98b1051ccd0fa937f681889e52c59f33372ffa27afff024bb76d9b0446b8a |
com.olivia.openpuremind |
05/23/2022 |
AndroidOS_DawDropper.HRX |
crypto-sequence-default-rtdb[.]firebaseio.com |
N/A
|
N/A |
0ebcf3bce940daf4017c85700ffc72f6b3277caf7f144a69fbfd437d1343b4ab |
com.myunique.sequencestore |
2022/05/31 |
AndroidOS_DawDropper.HRX |
coin-flow-a179b-default-rtdb.firebaseio.com
|
N/A
|
N/A |
2113451a983916b8c7918c880191f7d264f242b815b044a6351c527f8aeac3c8 |
com.flowmysequto.yamer |
05/2022 |
AndroidOS_DawDropper.HRX |
incrypted-app-default-rtdb.firebaseio.com
|
N/A
|
N/A |
71c44a78cd77a8f5767096f268c3193108ac06ff3779c65e78bc879d3b0ff11d |
com.qaz.universalsaver |
05/2022 |
AndroidOS_DawDropper.HRX |
saver-9a43a-default-rtdb[.]firebaseio.com |
hxxps://raw.githubusercontent.com/asFirstYouSaid/awdaw/main/Xnode_new.apk
hxxps://raw.githubusercontent.com/asFirstYouSaid/test/main/GoogleMaps%20(2)_obf.apk |
Ermac |
9b2064f8808d3aaa2d3dc9f5c7ee0775b29e29df3a958466a8953f148b702461 |
com.luckyg.cleaner |
06/02/2022 |
AndroidOS_DawDropper.HRXA |
lucky-cleaner-default-rtdb[.]firebaseio[.]com |
hxxps://github.com/gohhas/gate/raw/main/live.apk |
Octo |
ff8110883628f8d926588c0b7aedae8841df989d50f32c140d88f1105d1d3e02 |
com.scando.qukscanner |
06/28/2022 |
AndroidOS_DawDropper.HRX |
cleaner-f40c4-default-rtdb[.]firebaseio[.]com |
hxxps://raw.githubusercontent.com/k6062019/qq/main/clown.apk |
Octo |
02499a198a8be5e203b7929287115cc84d286fc6afdb1bc84f902e433a7961e4 |
com.qrdscannerratedx |
07/01/2022 |
AndroidOS_DawDropper.HRX |
Qrscanner-f6d8d-default-rtdb.firebaseio.com |
hxxps://raw.githubusercontent.com/k6062019/qq/main/clown.apk |
Octo |
Github repository
Repository |
Description |
hxxps://github.com/butcher65/test |
GitHub repository hosting the Octo and Hydra banking trojans |
hxxps://github.com/lotterevich/lott |
GitHub repository hosting the TeaBot banking trojan |
hxxps://github.com/asFirstYouSaid/test |
GitHub repository hosting the Ermac banking trojan |
hxxps://github.com/asFirstYouSaid/awdaw |
GitHub repository hosting the Ermac banking trojan |
hxxps://github.com/gohhas/gate |
GitHub repository hosting the Octo banking trojan |
hxxps://raw.github.com/k6062019/qq |
GitHub repository hosting the Octo banking trojan |
hxxps://github.com/briangreen7667/2705 |
GitHub repository hosting the Hydra banking trojan |
hxxps://github.com/uliaknazeva888/main |
GitHub repository hosting the Octo banking trojan |
hxxps://github.com/kazakovadana44/1.apk |
GitHub repository hosting the Octo banking trojan |
hxxps://github.com/sherrytho/test |
GitHub repository hosting the Hydra banking trojan |
Octo payload
SHA-256 |
Package name |
Download address |
Detection name |
3834eb0ff1a955dab719f2ae6a51114995a7e3bd0ea201fb4f044218fe72ba4e
|
com.fpkbdpwasnfa
|
hxxps://github.com/uliaknazeva888/qs/raw/main/1.apk |
AndroidOS_EventBot.GCL |
8e9fa712f490b50d13940cc3ab1509566f31627fce8848071a0547bda58ceac8 |
com.piecesimplevb |
hxxps://github.com/butcher65/test/raw/main/gala.apk |
AndroidOS_EventBot.GCL |
95182e759373f78c421b47dc92d15f1f37c1acea1cd76980058c6ad177491823 |
com.holdremember0 |
hxxps://raw.githubusercontent.com/k6062019/qq/main/clown.apk |
AndroidOS_EventBot.GCL |
95182e759373f78c421b47dc92d15f1f37c1acea1cd76980058c6ad177491823 |
com.holdremember0 |
hxxps://raw.githubusercontent.com/k6062019/qq/main/clown.apk |
AndroidOS_EventBot.GCL |
f0ee3582856f3f406970530138c06ba3c1c175e9d2dae95e6d3ef3c5ed6dc13a |
com.turncani
|
hxxps://raw.githubusercontent.com/k6062019/qq/main/porc.apk |
AndroidOS_EventBot.GCL |
b16769c154fbb8023ada13cf58a9b289b9643f6cb932afb4dde0189a147d5e11
|
com.thinkfinddau
|
hxxps://github.com/gohhas/gate/raw/main/live.apk |
AndroidOS_EventBot.GCL |
Network indicator |
Description |
vntososupplsos.live |
Octo C&C server |
olopokogulya.site |
Backup Octo C&C server |
nbvb3954.fun |
Backup Octo C&C server |
nbvvvb.hair |
Backup Octo C&C server |
nbvbbn.lol |
Backup Octo C&C server |
nbvber.makeup |
Backup Octo C&C server |
nbvbsd.mom |
Backup Octo C&C server |
nbvbwe.monster |
Backup Octo C&C server |
nbvb.one |
Backup Octo C&C server |
vbnbvb.online |
Backup Octo C&C server |
ccnbvb.pics |
Backup Octo C&C server |
xxnbvb.quest |
Backup Octo C&C server |
eenbvb.sbs |
Backup Octo C&C server |
asqwnbvb.shop |
Backup Octo C&C server |
qwnbvb.skin |
Backup Octo C&C server |
qqnbvb.space |
Backup Octo C&C server |
wwerenbvb.store |
Backup Octo C&C server |
Ermac payload
SHA-256 |
Package name |
Download address |
Detection Name |
cdf66b98f90a9e83b204bf2bb28915784f9e9ad4d2fb86648d1d1f7d3152dadd |
com.ceveluriseze.xuca |
hxxps://raw.githubusercontent.com/asFirstYouSaid/awdaw/main/Xnode_new.apk
hxxps://raw.githubusercontent.com/asFirstYouSaid/test/main/GoogleMaps%20(2)_obf.apk
|
AndroidOS_Anubis.GCL |
71927786fc16e90fe05e1eb032c3591d878c7cfd197d02113d7d006e2d7b171f |
com.ceveluriseze.xuca
|
hxxps://github.com/asFirstYouSaid/test/raw/main/110.apk
hxxps://github.com/asFirstYouSaid/test/raw/main/SecureChat%20(1).apk |
AndroidOS_Anubis.GCL
|
Network indicator |
Description |
193.106.191.121:3435 |
Ermac C&C server |
Hydra payload
SHA-256 |
Package name |
Download address |
Detection name |
3194e25f89540e98698bcd221c8a5dbfe4658ac14fd7e7cf7c29299f3675fcdd |
com.bulb.crush |
hxxps://github.com/briangreen7667/2705/raw/main/addon2.apk |
AndroidOS_Anubis.GCL |
93c5e98c06963c8a320f5876148ad45fb6cce1a40a7aaee195cfa5027e19426b
|
com.alley.work |
hxxps://github.com/butcher65/test/raw/main/latte.apk
|
AndroidOS_Anubis.GCL |
9c9bc75ce675754c655b0757a8655ff50186b1626862bcb5b8200c4047f3ab3c
|
com.risk.better |
hxxps://github.com/butcher65/test/raw/main/lolipop.apk
|
AndroidOS_Anubis.GCL
|
ad84c798e3c30ad941b37aababeb8edfaf52f13c0c7d32bfa96c4b989b135a8b |
com.plug.follow
|
hxxps://github.com/butcher65/test/raw/main/golgofan.apk |
AndroidOS_Anubis.GCL
|
7e95e9a306886dadbae68c586bf19eec6903bac15290fd60c47d29a2e3cbf047
|
com.tunnel.voyage
|
https://github.com/sherrytho/test/raw/main/golgol.apk
|
AndroidOS_Anubis.GCL |
Teabot payload
SHA-256 |
Package name |
Download address |
Detection name |
aea39ddf59ae764c40211a4d0e9c10514b37a9bbabf5b528de4cb7d2574b732b |
com.bthlu.xnbhp |
hxxps://github.com/lotterevich/lott/raw/main/maina.apk |
AndroidOS_Toddler.GCL
|
Network indicator |
Description |
185.215.113.31:83 |
TeaBot C&C server |