Analysis
-
max time kernel
179s -
max time network
187s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
05-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086.apk
-
Size
3.2MB
-
MD5
3a4ecfc9a36e7a4e95c5373a160ed226
-
SHA1
498a8f609fc55d8c84300fc019dd104b047989a4
-
SHA256
a57722c7f7226f0aa9d0522201de4f90464ec0767312bd70d068c0874c5db086
-
SHA512
9cb5e48cc1220652e3d2601bcdda1605b55679909b13c1bc57c8a1dc61dd774fde559aeaeecef95e5e5e685b79394fb3a43f184f7f38f88b66958a5420a57953
-
SSDEEP
49152:cZGm9XFAIv30HGRwE5DrVYVnIZ4BEdfh0Tgu4lP8W1Ge7V1JMl2tZbw90rFJ+7s:cdDhcYwcVYVHEdG/458W1Gelu0rjZ
Malware Config
Extracted
ginp
2.8d
mp70
http://coldcoolcoco.top/
http://jackblack.cc/
-
uri
api201
Extracted
ginp
http://coldcoolcoco.top/api201/
http://jackblack.cc/api201/
Signatures
-
Ginp
Ginp is an android banking trojan first seen in mid 2019.
-
pid Process 4484 enter.shift.cruel -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/enter.shift.cruel/app_DynamicOptDex/ew.json 4484 enter.shift.cruel /data/user/0/enter.shift.cruel/app_DynamicOptDex/ew.json 4484 enter.shift.cruel -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId enter.shift.cruel Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText enter.shift.cruel Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId enter.shift.cruel -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock enter.shift.cruel -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground enter.shift.cruel -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction enter.shift.cruel android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction enter.shift.cruel android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction enter.shift.cruel -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo enter.shift.cruel -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS enter.shift.cruel -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS enter.shift.cruel
Processes
-
enter.shift.cruel1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4484
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5389574fe334344bdcae6ff46b19cb054
SHA1513b987f781a1e3ba031a5a97eea53f164528f49
SHA2564fb928dfc447f26dcf1a9918987f66062d63f5607f78def60154b0937e0d3564
SHA512143022f1c52c5514ed8f57c52bf89e8a3d17c985214064ad3174584a16a4f58c1954f723097f0ae2a42a3db4855e1cda414d87c29e29b78436b0346e02d24d7b
-
Filesize
506KB
MD5357e51332c6fe1d2385251346d758ec9
SHA17fe3b1a726821ec50f44c401f2e31705f85a8b16
SHA25694c7865b6386fba3c0e64be0e5873d1e2289981a16ff2cbeba5fc2fb49aa14b4
SHA512ae7fc1169aedf0dfde58a2d371d2dac3880c76cd0519adc9b42276a5f8de82dd459aae62b04c6751f029ca55247a3f3ff7e4bd38f78af50f96bc9e3a3e5ae5a5