Analysis
-
max time kernel
179s -
max time network
132s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
16-06-2024 07:43
Static task
static1
Behavioral task
behavioral1
Sample
b267bca20bc365a9e7529eb217bd0e9c_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b267bca20bc365a9e7529eb217bd0e9c_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
b267bca20bc365a9e7529eb217bd0e9c_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
b267bca20bc365a9e7529eb217bd0e9c_JaffaCakes118.apk
-
Size
1.4MB
-
MD5
b267bca20bc365a9e7529eb217bd0e9c
-
SHA1
a686bc3454fd57796653590e3ddd34783d1f04af
-
SHA256
e10099c6468ad5c05ff606e2a03780ba424696380bbb4c6dacd005fe46f11b99
-
SHA512
8b750202ec9e2ee22368c0fe2a47657a388eb0c2c44d9a5caaf65960a49f38e40ee2e4cec631709780111b6e3ff989d23fb6d3d3a22ac5f579c5cd3835d5d169
-
SSDEEP
24576:ymPMupbe+lGFxxPJxhqY5INn+d04bs7OFnac4s3UIuiZEfEvON:xMupvl90d04bsSFnb43rxfEve
Malware Config
Extracted
ginp
2.8c
mp-4
http://wingaffordnasty.com/
http://change923.ru/
-
uri
api147
Extracted
ginp
http://wingaffordnasty.com/api147/
http://change923.ru/api147/
Signatures
-
Ginp
Ginp is an android banking trojan first seen in mid 2019.
-
pid Process 5055 jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu/app_DynamicOptDex/hf.json 5055 jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu /data/user/0/jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu/app_DynamicOptDex/hf.json 5055 jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu
Processes
-
jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
PID:5055
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD5a9885271de91b6664fcb40e3e268139e
SHA1a9c4fa498a09e17af468b8391af40f5167f95aa3
SHA25664e625bb0f9c7d18680d8444b48087f3c0a316c35c6fdccb0a264e0850783f60
SHA512c9be0b53ccb0ce2b80fab0783284fb0dac34fb037db819f5f71e248f04427a3847eadfda890d43f76cfe902619958f3dbde1c5d85846f12a3f792bb37b8dedde
-
Filesize
374KB
MD554de7eab470a4eabc743f3c0bb35ac26
SHA194b20038a9a917f7c95674aa18ef8315203c0e6c
SHA2560741f08f9ea71be64feb1eb6388922a822e60bbeaf2901810d90d89e02a44388
SHA51235021a8b3aa58a2e7861fbe8ba67ad942d5f5a2019edceef05a88e745e5e735025a7be983f8589892be9037bb65eb8d400bcaac253a8ed5cdfda3e5b86497d0f
-
/data/data/jffgxrlkjcrsqz.igtddgdtxbtarzhxar.nglslmkxojhkmfclysafamyleu/app_DynamicOptDex/oat/hf.json.cur.prof
Filesize405B
MD539fc06f9ac06a570afd7eb9d9b635a4c
SHA19c4fb29cd0cdaed3e7475695d61a3bb24332a501
SHA2569ca21ef097db46dcbfe604eb5cae26ffde839df0f05e05fc2e8b367c12db24e4
SHA51276d813a9ff84836d2ad7a7e48233ce89cd63540b02e1f2b0a6a1c4abf69f24119d3e1a89dd82904f23a69a802a711433ae289a641f9686093cc82f4c1a0010ad