Malware Analysis Report

2024-12-06 02:37

Sample ID 240221-sgt75shf5y
Target appปลอมกรมที่ดิน_DOL.apk
SHA256 c6213e451e4a23b7725143edd1c725aa748fd9eb32e33304b4f87d63c19e0504
Tags
gigabud
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c6213e451e4a23b7725143edd1c725aa748fd9eb32e33304b4f87d63c19e0504

Threat Level: Known bad

The file appปลอมกรมที่ดิน_DOL.apk was found to be: Known bad.

Malicious Activity Summary

gigabud

Gigabud payload

Gigabud family

Declares services with permission to bind to the system

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-02-21 15:06

Signatures

Gigabud family

gigabud

Gigabud payload

Description Indicator Process Target
N/A N/A N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-21 15:06

Reported

2024-02-21 15:07

Platform

android-x86-arm-20240221-en

Max time kernel

3s

Max time network

24s

Command Line

nrmahn.kwqzdrb.nahh

Signatures

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

nrmahn.kwqzdrb.nahh

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.206:443 android.apis.google.com tcp
US 1.1.1.1:53 app.pzs5k.xyz udp

Files

/data/data/nrmahn.kwqzdrb.nahh/no_backup/.flurryNoBackup/installationNum

MD5 d6fe784aca5e9af73227b62a0974125e
SHA1 fa2f4dfdc74c8d03e3ccf84b9d49649a1e9483d2
SHA256 83f2d05482d51d397913ade970185141d7a8c8a7e702b679ac81d8c2941c2195
SHA512 257def6b366fa118cee4a236ed238df7909117806e6bdc97ba022c4ccf1785b2e966458a0744127fb920afeec249cb980aa74561c999279ac28471cdd984b6fc