Malware Analysis Report

2024-09-09 13:27

Sample ID 230515-qh2mhadh4y
Target 6a770d4c5ba6ec625850de3ba3bd6310d86c229b6bccb50b09a54d3ec038cc1a
SHA256 6a770d4c5ba6ec625850de3ba3bd6310d86c229b6bccb50b09a54d3ec038cc1a
Tags
ginp mp6 banker infostealer trojan evasion
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6a770d4c5ba6ec625850de3ba3bd6310d86c229b6bccb50b09a54d3ec038cc1a

Threat Level: Known bad

The file 6a770d4c5ba6ec625850de3ba3bd6310d86c229b6bccb50b09a54d3ec038cc1a was found to be: Known bad.

Malicious Activity Summary

ginp mp6 banker infostealer trojan evasion

Ginp

Makes use of the framework's Accessibility service.

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

Requests dangerous framework permissions

Loads dropped Dex/Jar

Acquires the wake lock.

Requests disabling of battery optimizations (often used to enable hiding in the background).

Removes a system notification.

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2023-05-15 13:16

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-05-15 13:16

Reported

2023-05-15 13:19

Platform

android-x64-20220823-en

Max time kernel

529578s

Max time network

156s

Command Line

someone.audit.crawl

Signatures

Ginp

banker trojan infostealer ginp

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json N/A N/A
N/A /data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json N/A N/A

Processes

someone.audit.crawl

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 closedcloset.top udp
US 1.1.1.1:53 ssl.google-analytics.com udp
NL 142.250.179.200:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 insideluck.cc udp
US 1.1.1.1:53 insideluck.cc udp
US 1.1.1.1:53 insideluck.cc udp
US 1.1.1.1:53 insideluck.cc udp
US 1.1.1.1:53 insideluck.cc udp
US 1.1.1.1:53 insideluck.cc udp
US 1.1.1.1:53 insideluck.cc udp
US 1.1.1.1:53 android.apis.google.com udp
NL 142.251.39.110:443 android.apis.google.com tcp

Files

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 6c28bd2b1d1983c4d560cc6c72a26e1c
SHA1 eb212ea0794609c98812ff8bd5fec0a094c6ecf6
SHA256 013e1afe493332baa48d16230678463f60c603b1e6b808b371b20d1bfbf27435
SHA512 c252ebc9c33fa377fcb8955c420dbdffd693110303f560e4b5b2896ad6712dac9ff619e456985f2ed973a9ed8fb0d339bf80e8d17120f0e74842553a87bfa164

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 0bb2f793db509eeb9b64b2e7dbadb3b0
SHA1 b0a08381dbec074b669e8a13990be9450f0c8c9f
SHA256 2777d7506b8afdf6dfea88a03dcc35e8b046eb8d0a6b796b2b02b1a321de3a00
SHA512 472369787b7257937120682168624b2c094733572d02392ca7fbb9954afe00035a3b69e7848d501476d7e76513699f4493392422b74b5e2553535c2bab1acfbf

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 0bb2f793db509eeb9b64b2e7dbadb3b0
SHA1 b0a08381dbec074b669e8a13990be9450f0c8c9f
SHA256 2777d7506b8afdf6dfea88a03dcc35e8b046eb8d0a6b796b2b02b1a321de3a00
SHA512 472369787b7257937120682168624b2c094733572d02392ca7fbb9954afe00035a3b69e7848d501476d7e76513699f4493392422b74b5e2553535c2bab1acfbf

/data/user/0/someone.audit.crawl/app_DynamicOptDex/oat/cZf.json.cur.prof

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

Analysis: behavioral2

Detonation Overview

Submitted

2023-05-15 13:16

Reported

2023-05-15 13:19

Platform

android-x64-arm64-20220823-en

Max time kernel

529582s

Max time network

150s

Command Line

someone.audit.crawl

Signatures

Ginp

banker trojan infostealer ginp

Makes use of the framework's Accessibility service.

Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

banker
Description Indicator Process Target
Framework service call android.content.pm.IPackageManager.getInstalledApplications N/A N/A

Acquires the wake lock.

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json N/A N/A
N/A /data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Processes

someone.audit.crawl

Network

Country Destination Domain Proto
US 1.1.1.1:53 android.apis.google.com udp
US 1.1.1.1:53 android.apis.google.com udp
US 1.1.1.1:53 android.apis.google.com udp
NL 142.251.36.46:443 android.apis.google.com tcp
NL 142.251.36.46:443 android.apis.google.com tcp
N/A 224.0.0.251:5353 udp
NL 172.217.168.226:443 tcp
NL 142.251.39.102:443 tcp
US 1.1.1.1:53 infinitedata-pa.googleapis.com udp
NL 142.251.39.106:443 infinitedata-pa.googleapis.com tcp
US 1.1.1.1:53 closedcloset.top udp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 closedcloset.top udp
US 1.1.1.1:53 closedcloset.top udp
US 1.1.1.1:53 closedcloset.top udp
US 1.1.1.1:53 closedcloset.top udp
US 1.1.1.1:53 closedcloset.top udp
US 1.1.1.1:53 closedcloset.top udp
US 1.1.1.1:53 android.apis.google.com udp
NL 142.251.39.110:443 android.apis.google.com tcp
NL 142.251.39.110:443 android.apis.google.com tcp
US 1.1.1.1:53 insideluck.cc udp
US 1.1.1.1:53 ssl.google-analytics.com udp

Files

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 6c28bd2b1d1983c4d560cc6c72a26e1c
SHA1 eb212ea0794609c98812ff8bd5fec0a094c6ecf6
SHA256 013e1afe493332baa48d16230678463f60c603b1e6b808b371b20d1bfbf27435
SHA512 c252ebc9c33fa377fcb8955c420dbdffd693110303f560e4b5b2896ad6712dac9ff619e456985f2ed973a9ed8fb0d339bf80e8d17120f0e74842553a87bfa164

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 0bb2f793db509eeb9b64b2e7dbadb3b0
SHA1 b0a08381dbec074b669e8a13990be9450f0c8c9f
SHA256 2777d7506b8afdf6dfea88a03dcc35e8b046eb8d0a6b796b2b02b1a321de3a00
SHA512 472369787b7257937120682168624b2c094733572d02392ca7fbb9954afe00035a3b69e7848d501476d7e76513699f4493392422b74b5e2553535c2bab1acfbf

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 0bb2f793db509eeb9b64b2e7dbadb3b0
SHA1 b0a08381dbec074b669e8a13990be9450f0c8c9f
SHA256 2777d7506b8afdf6dfea88a03dcc35e8b046eb8d0a6b796b2b02b1a321de3a00
SHA512 472369787b7257937120682168624b2c094733572d02392ca7fbb9954afe00035a3b69e7848d501476d7e76513699f4493392422b74b5e2553535c2bab1acfbf

/data/user/0/someone.audit.crawl/app_DynamicOptDex/oat/cZf.json.cur.prof

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

Analysis: behavioral3

Detonation Overview

Submitted

2023-05-15 13:16

Reported

2023-05-15 13:19

Platform

android-x86-arm-20220823-en

Max time kernel

529576s

Max time network

152s

Command Line

someone.audit.crawl

Signatures

Ginp

banker trojan infostealer ginp

Makes use of the framework's Accessibility service.

Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

banker
Description Indicator Process Target
Framework service call android.content.pm.IPackageManager.getInstalledApplications N/A N/A

Acquires the wake lock.

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json N/A N/A
N/A /data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json N/A N/A
N/A /data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json N/A N/A

Removes a system notification.

evasion
Description Indicator Process Target
Framework service call android.app.INotificationManager.cancelNotificationWithTag N/A N/A

Processes

someone.audit.crawl

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/someone.audit.crawl/app_DynamicOptDex/oat/x86/cZf.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp
NL 142.250.179.202:443 tcp
NL 172.217.168.202:443 tcp

Files

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 6c28bd2b1d1983c4d560cc6c72a26e1c
SHA1 eb212ea0794609c98812ff8bd5fec0a094c6ecf6
SHA256 013e1afe493332baa48d16230678463f60c603b1e6b808b371b20d1bfbf27435
SHA512 c252ebc9c33fa377fcb8955c420dbdffd693110303f560e4b5b2896ad6712dac9ff619e456985f2ed973a9ed8fb0d339bf80e8d17120f0e74842553a87bfa164

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 0bb2f793db509eeb9b64b2e7dbadb3b0
SHA1 b0a08381dbec074b669e8a13990be9450f0c8c9f
SHA256 2777d7506b8afdf6dfea88a03dcc35e8b046eb8d0a6b796b2b02b1a321de3a00
SHA512 472369787b7257937120682168624b2c094733572d02392ca7fbb9954afe00035a3b69e7848d501476d7e76513699f4493392422b74b5e2553535c2bab1acfbf

/data/user/0/someone.audit.crawl/app_DynamicOptDex/oat/x86/cZf.vdex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/someone.audit.crawl/app_DynamicOptDex/oat/x86/cZf.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 0bb2f793db509eeb9b64b2e7dbadb3b0
SHA1 b0a08381dbec074b669e8a13990be9450f0c8c9f
SHA256 2777d7506b8afdf6dfea88a03dcc35e8b046eb8d0a6b796b2b02b1a321de3a00
SHA512 472369787b7257937120682168624b2c094733572d02392ca7fbb9954afe00035a3b69e7848d501476d7e76513699f4493392422b74b5e2553535c2bab1acfbf

/data/user/0/someone.audit.crawl/app_DynamicOptDex/cZf.json

MD5 c652cb5eefbfaac0fa3cc43641ef53f9
SHA1 cdaacebc1bbe7055285292e924d2a3e8c800ec0d
SHA256 9e6a3b162b7d597d758cf0207a42c5909aa6c086882270ee86b2fe31bc5df202
SHA512 6ce360365db0746c108e10307297c68a5e7391cc1923234c135e004ac8020d8cf7d7a2dc787477cb27e5cb12bc356f0faec5c8b4b75d93ef0b1842b6acc68e83

/data/user/0/someone.audit.crawl/app_DynamicOptDex/oat/cZf.json.cur.prof

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/someone.audit.crawl/app_webview/variations_seed_new

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/someone.audit.crawl/app_webview/variations_stamp

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/someone.audit.crawl/app_webview/webview_data.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/someone.audit.crawl/shared_prefs/WebViewChromiumPrefs.xml

MD5 21223e9184445fe043476484cd8cb1f9
SHA1 2b4813f849121d60ba35eb0889080668bb62c778
SHA256 bb61b7c087c2ae2de93a7740ff75707342940557146366e92b840284cd9446af
SHA512 be21408de0cc643650e5d9ab9057a8f9de88e37fbdc6417cfeba160402ec4cd14fccbc82cbbfd941ecfc0bb3d4056ee61ac199efdc99d647d53e65818835fd48

/data/user/0/someone.audit.crawl/app_webview/metrics_guid

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/someone.audit.crawl/app_webview/metrics_guid

MD5 f33052bdda56a2124ee3ba82886794b8
SHA1 8f1dd61578d7ec149852c58c1d7a71404695ef44
SHA256 a27c81912167da45e1a148ca101887e53b479d15f7fffc4add1d641542c3f497
SHA512 557744b1f0b9ad73daf795761fff8715f499ab41fc71dd0a52048c0c5e380f0673bdd8a75f8a8d2e9e64c36dd859609b94cf4bffac5cc5508710bb35ce15a9a8

/data/user/0/someone.audit.crawl/app_webview/Web Data

MD5 dc79f9ce5f3ab5270b33e61119dfc959
SHA1 1844bf222a5144b513dcf2fb50a18c011701c647
SHA256 47e65f4de08deabfd52ecdb8b0a29c61c482188b92c36182e2112ca0a8f4ff65
SHA512 18b8894a7f35df516f423bbdebf1e05ce09eaf4345b139e59e603cadb81f8d1fa20f793438c28e8fd9a64e64f0684223d90ce6f10d3f93cb0c781049a8cff03e

/data/user/0/someone.audit.crawl/app_webview/Web Data-journal

MD5 d023d99bf21d2f185d81d09c25087007
SHA1 4d6ba79ef6421eddd248272c68ef11536284938c
SHA256 c2190e93ea5da2466989620a7788329c388959a7e4e1c2c9a36b249f1631bf9d
SHA512 9910289ae0dd2dcb8e011d659d91eb4a51f2bb600eb2bc9ec164c46c49844f25d9ce4e13e1287a4dc0c817c986c74d845da1b9499abc2aba0f710529a4da6943

/data/user/0/someone.audit.crawl/app_webview/GPUCache/index

MD5 93027d42b314432c4216e6cfca48b384
SHA1 43448dd8102979c3926828182579691945eedd4e
SHA256 3cda72e67c62e52a342309c44f2cb3b6c1019c7b11822e2f628e48e254e2b41c
SHA512 a52d13cf7f5be196d1e2f135b8a010f80558c5d35e90e7792441d1c976517d55cf1c9587949db69ebef294cc6ef79529a65e7d779964793016efecacd152f70e

/data/user/0/someone.audit.crawl/app_webview/GPUCache/index-dir/temp-index

MD5 691b4806bd5f20496d629203a1aba2ba
SHA1 da4fd1533084cf61651136a6322fe702bc55bf84
SHA256 6d49a9b1fc5db3347ea42df604ddf175f0cd06d591b1dbe9535344ded21f5faa
SHA512 efefe3780a3ba36b991597ed3df79c245c069b424dcd34335e7a78c5ea91d3c6b78a56d6cd24a73d8dfd20e96fd024d180748f6d0307750673e1b2a81829586e

/data/user/0/someone.audit.crawl/app_webview/GPUCache/index-dir/temp-index

MD5 2c57494d2a9899a5f90b7394998b65ce
SHA1 ba75257d2a3701eeb41f004a894cf2a3151cad10
SHA256 2edf383383e66149c8f655dd258a9acb3fb209f6be5c47cfde7bf341156cc0a4
SHA512 cb35f8c1d2cb2add9e4b8203d2e17009dfb7e3c1a34edd58cb5b926de6eab1982670b9e3039ac3c80111011ea35e30b2604284ee745ebbe444bde0c66b723272