Malware Analysis Report

2024-12-04 03:10

Sample ID 240205-hvlg2sabf4
Target fake_application_dol.zip
SHA256 df47187707ce3aa7a1aa677e2ed6dc26024017ad447323ccca4eb642615cdbc4
Tags
gigabud
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

df47187707ce3aa7a1aa677e2ed6dc26024017ad447323ccca4eb642615cdbc4

Threat Level: Known bad

The file fake_application_dol.zip was found to be: Known bad.

Malicious Activity Summary

gigabud

Gigabud family

Gigabud payload

Declares services with permission to bind to the system

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-02-05 07:03

Signatures

Gigabud family

gigabud

Gigabud payload

Description Indicator Process Target
N/A N/A N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-05 07:03

Reported

2024-02-05 07:04

Platform

android-x86-arm-20231215-en

Max time kernel

2s

Max time network

45s

Command Line

nrmahn.kwqzdrb.nahh

Signatures

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

nrmahn.kwqzdrb.nahh

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.201.106:443 semanticlocation-pa.googleapis.com tcp
GB 216.58.201.110:443 tcp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
US 1.1.1.1:53 app.pzs5k.xyz udp
SG 8.219.85.91:8888 tcp

Files

/data/data/nrmahn.kwqzdrb.nahh/no_backup/.flurryNoBackup/installationNum

MD5 5aae6b2c50147ee610634c450e2852fa
SHA1 d0a1f6a11d2898edb30159f8e17c7a26565e9ffd
SHA256 43e29c9044683d647955eb3f8570b90a7a60c756f0b57ace370b6bbe9bb82389
SHA512 be7b8543eac6952b6503e6c2e4708f7f698919db5fda89ea8fedc97713e579911fdd194f758ac974050509bc1197193d247dc19fe3fcf1aa69ad88dc4882be44