Malware Analysis Report

2024-12-06 02:37

Sample ID 240201-b95e5sggg5
Target appปลอมกรมที่ดิน_DOL.apk
SHA256 c6213e451e4a23b7725143edd1c725aa748fd9eb32e33304b4f87d63c19e0504
Tags
gigabud
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c6213e451e4a23b7725143edd1c725aa748fd9eb32e33304b4f87d63c19e0504

Threat Level: Known bad

The file appปลอมกรมที่ดิน_DOL.apk was found to be: Known bad.

Malicious Activity Summary

gigabud

Gigabud payload

Gigabud family

Declares services with permission to bind to the system

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-02-01 01:51

Signatures

Gigabud family

gigabud

Gigabud payload

Description Indicator Process Target
N/A N/A N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-01 01:51

Reported

2024-02-01 01:52

Platform

android-x86-arm-20231215-en

Max time kernel

2s

Max time network

10s

Command Line

nrmahn.kwqzdrb.nahh

Signatures

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

nrmahn.kwqzdrb.nahh

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.212.234:443 semanticlocation-pa.googleapis.com tcp

Files

/data/data/nrmahn.kwqzdrb.nahh/no_backup/.flurryNoBackup/installationNum

MD5 c3f43bf3c7ed1ed252f15a3fe586e49d
SHA1 a26aa591f0251ab46e5e810cae891a027a1727e0
SHA256 97e95d2c6d1be34d9d0fadff139b906d9180046e803d7a5b21317f05b9bef28c
SHA512 496835ba8e98000ede6961ba176b79f5203bbb5e1b1f3f8fbe3428ae9a046ee69745c6449849c1c44a429f83c0e0d79228ed77405c4e6846a52fe5cd54696cff