Analysis

  • max time kernel
    179s
  • max time network
    186s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    05-08-2024 22:04

General

  • Target

    a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086.apk

  • Size

    3.2MB

  • MD5

    3a4ecfc9a36e7a4e95c5373a160ed226

  • SHA1

    498a8f609fc55d8c84300fc019dd104b047989a4

  • SHA256

    a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086

  • SHA512

    9cb5e48cc1220652e3d2601bcdda1605b55679909b13c1bc57c8a1dc61dd774fde559aeaeecef95e5e5e685b79394fb3a43f184f7f38f88b66958a5420a57953

  • SSDEEP

    49152:cZGm9XFAIv30HGRwE5DrVYVnIZ4BEdfh0Tgu4lP8W1Ge7V1JMl2tZbw90rFJ+7s:cdDhcYwcVYVHEdG/458W1Gelu0rjZ

Malware Config

Extracted

Family

ginp

Version

2.8d

Botnet

mp70

C2

http://coldcoolcoco.top/

http://jackblack.cc/

Attributes
  • uri

    api201

Extracted

Family

ginp

C2

http://coldcoolcoco.top/api201/

http://jackblack.cc/api201/

Signatures

  • Ginp

    Ginp is an android banking trojan first seen in mid 2019.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs

Processes

  • enter.shift.cruel
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    PID:4972

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/enter.shift.cruel/app_DynamicOptDex/ew.json

    Filesize

    506KB

    MD5

    389574fe334344bdcae6ff46b19cb054

    SHA1

    513b987f781a1e3ba031a5a97eea53f164528f49

    SHA256

    4fb928dfc447f26dcf1a9918987f66062d63f5607f78def60154b0937e0d3564

    SHA512

    143022f1c52c5514ed8f57c52bf89e8a3d17c985214064ad3174584a16a4f58c1954f723097f0ae2a42a3db4855e1cda414d87c29e29b78436b0346e02d24d7b

  • /data/data/enter.shift.cruel/app_DynamicOptDex/ew.json

    Filesize

    506KB

    MD5

    357e51332c6fe1d2385251346d758ec9

    SHA1

    7fe3b1a726821ec50f44c401f2e31705f85a8b16

    SHA256

    94c7865b6386fba3c0e64be0e5873d1e2289981a16ff2cbeba5fc2fb49aa14b4

    SHA512

    ae7fc1169aedf0dfde58a2d371d2dac3880c76cd0519adc9b42276a5f8de82dd459aae62b04c6751f029ca55247a3f3ff7e4bd38f78af50f96bc9e3a3e5ae5a5

  • /data/data/enter.shift.cruel/app_DynamicOptDex/oat/ew.json.cur.prof

    Filesize

    404B

    MD5

    32e996ca392fcd54f8ff470430c647d2

    SHA1

    e645c5b9073380fab6dbbb491863136975354d92

    SHA256

    f12f070fdc45b3e19dc847e3593493d7a83fff621730c25afdd7d4532d443de5

    SHA512

    6d15831347e932816f7632b9d49d1709fc7f051e5ae4ff411c8985aa80c4956cd1713bd350a0a45d11f7bbc4e5afe32ef2b2cb40aae68dc7126f0bc7db573a7b