Analysis

  • max time kernel
    2085982s
  • max time network
    300s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    18-12-2023 09:42

General

  • Target

    AndroidMalware_MediaPlayer.apk

  • Size

    1.6MB

  • MD5

    3c80f15c772243697e72526ff33c38f6

  • SHA1

    3ce90680bad0240dd65cfdc1dfe12e22088c676b

  • SHA256

    421629ea13d233bbc36a8900995ab488c3d0cbaba82db9468a524e31074b1858

  • SHA512

    eecc7cdee67ef0ebffa13294860a141541d8b1c3d6767420349c3a1a58b16744be2a40d189504957ecf06c731a47e1615e7e905b7e4d80d721b4a643cf10cb56

  • SSDEEP

    49152:kIMu39j0DrihkfQFOFFTF+NpNF2bXO5UFwLBVVf/Cc2Y5:kW5EZiNFCO5UFwLv

Malware Config

Extracted

Family

ginp

Version

2.8d

Botnet

mp19

C2

http://girlfrommars.top/

http://goldfingers.top/

Attributes
  • uri

    api201

Extracted

Family

ginp

C2

http://girlfrommars.top/api201/

http://goldfingers.top/api201/

Signatures

  • Ginp

    Ginp is an android banking trojan first seen in mid 2019.

  • Makes use of the framework's Accessibility service 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Acquires the wake lock 1 IoCs

Processes

  • main.trash.enough
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Acquires the wake lock
    PID:4959

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/main.trash.enough/app_DynamicOptDex/TLMd.json

    Filesize

    383KB

    MD5

    4a03024f49e64430751cbf2faa5477e1

    SHA1

    d932f11b5ad92dba6817534f1c9613045f8f879f

    SHA256

    23fba3ab95bfa56411cf5da72ecbaefb1415adf856cc3715a4018e7360d4cde7

    SHA512

    3375b5fe7be7c261d949737670a70048cc097b0ccb557f3e52c877e2925c1a17728c957d1f26c99588d60c98daa0b22b46bb08c2abead7472fc53ab6dcba7555

  • /data/data/main.trash.enough/app_DynamicOptDex/TLMd.json

    Filesize

    383KB

    MD5

    eed8c84048181aa9bb8a3538d82e22af

    SHA1

    7c4bb322cabe81a61d71615377ee13c0f5daf5a1

    SHA256

    3b4edc3f61bb70092962b5da28beab1069e7804791b605e0b51020a9d91733a2

    SHA512

    ec435bb00223319306a1a4da65b0d4abde08a9f8fc89b37c677f4915f6b25740747c3ac1eaf2eb8296a1e2b27398b04ccce9a0910c3cfd02090e67b114738ae6

  • /data/data/main.trash.enough/app_DynamicOptDex/oat/TLMd.json.cur.prof

    Filesize

    329B

    MD5

    c1e1a5864f80a9bd115790c1d4052c7c

    SHA1

    7728488020d10b19dc09d2215b23930f0b8a8b0d

    SHA256

    b53dbfb959aed69fda77b6a070258f8719e266ce0f86f9fea943130edbb995eb

    SHA512

    6fd97fc790f970772c4047af8bd41b12a45c1d4ff566cad59b8d2d6d5f983f7b6b0fc67c7765b87f94fea6772ee758825c5f2e7ec5c15274254f9bf2c315b965