Malware Analysis Report

2024-12-06 02:36

Sample ID 240201-b7kb7agga4
Target appปลอมกรมที่ดิน_DOL.apk
SHA256 c6213e451e4a23b7725143edd1c725aa748fd9eb32e33304b4f87d63c19e0504
Tags
gigabud
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c6213e451e4a23b7725143edd1c725aa748fd9eb32e33304b4f87d63c19e0504

Threat Level: Known bad

The file appปลอมกรมที่ดิน_DOL.apk was found to be: Known bad.

Malicious Activity Summary

gigabud

Gigabud family

Gigabud payload

Declares services with permission to bind to the system

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-02-01 01:47

Signatures

Gigabud family

gigabud

Gigabud payload

Description Indicator Process Target
N/A N/A N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-01 01:47

Reported

2024-02-01 01:50

Platform

android-x86-arm-20231215-en

Max time kernel

3s

Max time network

150s

Command Line

nrmahn.kwqzdrb.nahh

Signatures

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

nrmahn.kwqzdrb.nahh

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.14:443 android.apis.google.com tcp
US 1.1.1.1:53 app.pzs5k.xyz udp
SG 8.219.85.91:8888 tcp
SG 8.219.85.91:8888 tcp
SG 8.219.85.91:8888 tcp
SG 8.219.85.91:8888 tcp
SG 8.219.85.91:8888 tcp
SG 8.219.85.91:8888 tcp

Files

/data/data/nrmahn.kwqzdrb.nahh/no_backup/.flurryNoBackup/installationNum

MD5 e4ca90b7d92e4e69aba30f0974b31b76
SHA1 21722edfac95e3efac9261b2275c8a13a28d07fc
SHA256 d4db3e83f646eb6d6ef16bea3a7633d21e2679bd42ba7c0a7defc64949d00df5
SHA512 92065fdae398cd79ad1c52b4227ae0f10b80b2108fa5592db86bdb1aba2c0b56d4c98102f338bf9856148d63962d4bd7c7c323d719bf84a07be323d767449720