Malware Analysis Report

2024-12-06 02:36

Sample ID 240409-m7y15agf7s
Target 237ffd0431864aea0d196999ddaa6197.apk
SHA256 0e067ab9e834f662157225be4b912dad499980509e31c6754ed325a39e669527
Tags
gigabud
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0e067ab9e834f662157225be4b912dad499980509e31c6754ed325a39e669527

Threat Level: Known bad

The file 237ffd0431864aea0d196999ddaa6197.apk was found to be: Known bad.

Malicious Activity Summary

gigabud

Gigabud family

Gigabud payload

Declares services with permission to bind to the system

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-09 11:07

Signatures

Gigabud family

gigabud

Gigabud payload

Description Indicator Process Target
N/A N/A N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-09 11:07

Reported

2024-04-09 11:11

Platform

android-x86-arm-20240221-en

Max time kernel

3s

Max time network

156s

Command Line

rhxppdnte.yhaubifgo.ijmttqkj

Signatures

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

rhxppdnte.yhaubifgo.ijmttqkj

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.201.106:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.200.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
US 1.1.1.1:53 app.tw7yk.cc udp
SG 8.219.85.91:8888 tcp
GB 142.250.200.10:443 semanticlocation-pa.googleapis.com tcp
SG 8.219.85.91:8888 tcp
SG 8.219.85.91:8888 tcp
SG 8.219.85.91:8888 tcp
SG 8.219.85.91:8888 tcp
SG 8.219.85.91:8888 tcp

Files

/data/data/rhxppdnte.yhaubifgo.ijmttqkj/no_backup/.flurryNoBackup/installationNum

MD5 9092370a2274375e7ea49308f49c417a
SHA1 4ed939f54a7b28e3c12e0fa14191374fc1ae521a
SHA256 0dab6393ad5655858a2bd7591d37966cbc2dae2364a8a5907fcf8294589f36d0
SHA512 665553c8c6fbd344b323c106c71736c185e7c3c38b64ab3b8d696b30804368a03dc127efab6ceecb8bf521c6307e42101f2357f7bf8f5faf95ac5a1311fb94e0

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-09 11:07

Reported

2024-04-09 11:10

Platform

android-x86-arm-20240221-en

Max time kernel

2s

Max time network

138s

Command Line

rhxppdnte.yhaubifgo.ijmttqkj

Signatures

N/A

Processes

rhxppdnte.yhaubifgo.ijmttqkj

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.179.234:443 semanticlocation-pa.googleapis.com tcp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.213.14:443 android.apis.google.com tcp
GB 172.217.169.10:443 semanticlocation-pa.googleapis.com tcp

Files

/data/data/rhxppdnte.yhaubifgo.ijmttqkj/files/.ss/l4ddc48f4.so

MD5 339d15e2089afd52f6e76644c1b11f04
SHA1 960e776b248ffb7e7eb10a927644a03edc826718
SHA256 d815771ce659564b47867456d4435345868e289902e065092656bee62e268af1
SHA512 7d94b9f4ba978b70633eab88adc9b97beb97eb0076a8368f13bcc4abe3321282c6afb30382fe2c3e06096aa8e6ab865898910435c0d12addfd4c971f82ecfb88