General

  • Target

    dsi_fake_application.apk

  • Size

    7.9MB

  • MD5

    af98e5ee64022e7b7ee6aff4f527e060

  • SHA1

    76f1c7f2b0fe4154eab5d808417320ece4475f0e

  • SHA256

    22499d200dc0e5779a29c0a9c5b51592748e4cb0d6ba81191c8c2fdcbaef3286

  • SHA512

    36643969bb0773e62350628f1c97d8e152911e6e052b759513cf58d8533afd4e03cdc09d39298f24017d448430466ac6e3a6ca777335d527bdec80266cc0c863

  • SSDEEP

    196608:03qEs83rJzZ7MhXaYvoAKRu0W+h2uJWww6WUq3/Y:03q/orPmaYjKRubMFw6NqPY

Score
10/10

Malware Config

Extracted

Family

gigabud

C2

http://nnzf1.cc/x/command?token=

http://8.219.85.91:8888/push-streaming?id=1234

Signatures

  • Gigabud family
  • Gigabud payload 1 IoCs
  • Requests dangerous framework permissions 8 IoCs

Files

  • dsi_fake_application.apk
    .apk android arch:arm

    com.sinyee.babybus.earthquakeIV

    com.sinyee.babybus.earthquakeIV.activity.SplashActivity


Android Permissions

dsi_fake_application.apk

Permissions

android.permission.BIND_ACCESSIBILITY_SERVICE

android.permission.REQUEST_DELETE_PACKAGES

android.permission.QUERY_ALL_PACKAGES

android.permission.GET_INSTALLED_APPS

android.permission.ACCESS_NETWORK_STATE

android.permission.FOREGROUND_SERVICE

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.CAMERA

android.permission.RECORD_AUDIO

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.READ_SMS

android.permission.RECEIVE_SMS

android.permission.SEND_SMS

android.permission.SYSTEM_ALERT_WINDOW

android.permission.SYSTEM_OVERLAY_WINDOW

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.READ_EXTERNAL_STORAGE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.WRITE_SETTINGS

android.permission.ACCESS_NOTIFICATION_POLICY