Analysis
-
max time kernel
179s -
max time network
186s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
05-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086.apk
-
Size
3.2MB
-
MD5
3a4ecfc9a36e7a4e95c5373a160ed226
-
SHA1
498a8f609fc55d8c84300fc019dd104b047989a4
-
SHA256
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086
-
SHA512
9cb5e48cc1220652e3d2601bcdda1605b55679909b13c1bc57c8a1dc61dd774fde559aeaeecef95e5e5e685b79394fb3a43f184f7f38f88b66958a5420a57953
-
SSDEEP
49152:cZGm9XFAIv30HGRwE5DrVYVnIZ4BEdfh0Tgu4lP8W1Ge7V1JMl2tZbw90rFJ+7s:cdDhcYwcVYVHEdG/458W1Gelu0rjZ
Malware Config
Extracted
ginp
2.8d
mp70
http://coldcoolcoco.top/
http://jackblack.cc/
-
uri
api201
Extracted
ginp
http://coldcoolcoco.top/api201/
http://jackblack.cc/api201/
Signatures
-
Ginp
Ginp is an android banking trojan first seen in mid 2019.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
enter.shift.cruelioc pid process /data/user/0/enter.shift.cruel/app_DynamicOptDex/ew.json 4972 enter.shift.cruel /data/user/0/enter.shift.cruel/app_DynamicOptDex/ew.json 4972 enter.shift.cruel -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
enter.shift.crueldescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText enter.shift.cruel Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId enter.shift.cruel Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId enter.shift.cruel -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
enter.shift.crueldescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock enter.shift.cruel -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
enter.shift.crueldescription ioc process Framework service call android.app.IActivityManager.setServiceForeground enter.shift.cruel -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
enter.shift.cruelioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction enter.shift.cruel android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction enter.shift.cruel android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction enter.shift.cruel android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction enter.shift.cruel android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction enter.shift.cruel android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction enter.shift.cruel -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
enter.shift.crueldescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo enter.shift.cruel
Processes
-
enter.shift.cruel1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
PID:4972
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5389574fe334344bdcae6ff46b19cb054
SHA1513b987f781a1e3ba031a5a97eea53f164528f49
SHA2564fb928dfc447f26dcf1a9918987f66062d63f5607f78def60154b0937e0d3564
SHA512143022f1c52c5514ed8f57c52bf89e8a3d17c985214064ad3174584a16a4f58c1954f723097f0ae2a42a3db4855e1cda414d87c29e29b78436b0346e02d24d7b
-
Filesize
506KB
MD5357e51332c6fe1d2385251346d758ec9
SHA17fe3b1a726821ec50f44c401f2e31705f85a8b16
SHA25694c7865b6386fba3c0e64be0e5873d1e2289981a16ff2cbeba5fc2fb49aa14b4
SHA512ae7fc1169aedf0dfde58a2d371d2dac3880c76cd0519adc9b42276a5f8de82dd459aae62b04c6751f029ca55247a3f3ff7e4bd38f78af50f96bc9e3a3e5ae5a5
-
Filesize
404B
MD532e996ca392fcd54f8ff470430c647d2
SHA1e645c5b9073380fab6dbbb491863136975354d92
SHA256f12f070fdc45b3e19dc847e3593493d7a83fff621730c25afdd7d4532d443de5
SHA5126d15831347e932816f7632b9d49d1709fc7f051e5ae4ff411c8985aa80c4956cd1713bd350a0a45d11f7bbc4e5afe32ef2b2cb40aae68dc7126f0bc7db573a7b