Malware Analysis Report

2024-12-01 22:18

Sample ID 230327-mchewsfa3x
Target COJ.apk
SHA256 570d051b3bc3e982c90785b89678020651c4ef87c2ad6102957c95bb38e9b1f4
Tags
gigabud
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

570d051b3bc3e982c90785b89678020651c4ef87c2ad6102957c95bb38e9b1f4

Threat Level: Known bad

The file COJ.apk was found to be: Known bad.

Malicious Activity Summary

gigabud

Gigabud family

Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-03-27 10:19

Signatures

Gigabud family

gigabud

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-27 10:19

Reported

2023-03-27 10:19

Platform

android-x86-arm-20220823-en

Max time kernel

580163s

Max time network

12s

Command Line

com.pp.checklist

Signatures

N/A

Processes

com.pp.checklist

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 android.apis.google.com udp
NL 142.251.39.110:443 android.apis.google.com tcp
US 1.1.1.1:53 infinitedata-pa.googleapis.com udp

Files

/data/user/0/com.pp.checklist/no_backup/.flurryNoBackup/installationNum

MD5 b8bb122fd5c6693bd67c499e5ccffa52
SHA1 6a640a7ca1e84b49d8ae0d7e64d3cc59531e0815
SHA256 bf73eccda87568be30b7979ec1b482bb9544581c8a8be5b0bf2036c550e006c0
SHA512 f02cd10a5aa4d5cc6522b425bc6555d039cd1e0adffce280b628110a5dbcb025fe0047e184ef10566e5cd28f6e0d2f257b12160b193bf03769401e720f432916

/data/user/0/com.pp.checklist/files/.fstreaming/fInProgress/currentFile

MD5 fa63e9d869d9c4c26a38e2ef5887a271
SHA1 f0f10281f211f0840141167957984b523d805e3e
SHA256 05e66558ea6e8e325a9471d12b62d7b5bb1bd55e995ffa5b59271f568815d586
SHA512 7000300f18974f985fcfa65a936cf9131688e0941cd6178c4c13984008a0dbfc65d1d8358c71fd6f84ec316991925ce2ac09ac6c50946afbc5106e1f9022a132