Analysis
-
max time kernel
179s -
max time network
187s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
06-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
9fce9314bcc4c7d90ed45b528abb19dc9090338b6455843360cec8c2f258a18e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9fce9314bcc4c7d90ed45b528abb19dc9090338b6455843360cec8c2f258a18e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
9fce9314bcc4c7d90ed45b528abb19dc9090338b6455843360cec8c2f258a18e.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
9fce9314bcc4c7d90ed45b528abb19dc9090338b6455843360cec8c2f258a18e.apk
-
Size
3.0MB
-
MD5
f1e1abecd2d3715ba8cc5c7ce98c2a42
-
SHA1
0a55473f0dde7cb1f89374e986b4a8a1c05fccb9
-
SHA256
9fce9314bcc4c7d90ed45b528abb19dc9090338b6455843360cec8c2f258a18e
-
SHA512
18bc19d5c5034054d798c8b6806ea8029d389da972e455003138ef1cab4a7f88a8046d787ff37f36abc8508d8cf9444bc33971be15945cc7e6c56a23bafda5e6
-
SSDEEP
98304:ILad9wCmDhPbunS6t0GVvA0H6cXIFRiPbn9VPl:ILoxiPU0+BalFkPvN
Malware Config
Extracted
ginp
2.8d
mp68
http://crawlbone.top/
http://jackblack.cc/
-
uri
api201
Extracted
ginp
http://crawlbone.top/api201/
http://jackblack.cc/api201/
Signatures
-
Ginp
Ginp is an android banking trojan first seen in mid 2019.
-
pid Process 4272 defy.enemy.shy -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/defy.enemy.shy/app_DynamicOptDex/WOfWbg.json 4272 defy.enemy.shy /data/user/0/defy.enemy.shy/app_DynamicOptDex/WOfWbg.json 4298 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/defy.enemy.shy/app_DynamicOptDex/WOfWbg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/defy.enemy.shy/app_DynamicOptDex/oat/x86/WOfWbg.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/defy.enemy.shy/app_DynamicOptDex/WOfWbg.json 4272 defy.enemy.shy -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId defy.enemy.shy Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText defy.enemy.shy Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId defy.enemy.shy -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock defy.enemy.shy -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground defy.enemy.shy -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction defy.enemy.shy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction defy.enemy.shy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction defy.enemy.shy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction defy.enemy.shy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction defy.enemy.shy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction defy.enemy.shy -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo defy.enemy.shy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone defy.enemy.shy -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS defy.enemy.shy -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS defy.enemy.shy -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver defy.enemy.shy -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo defy.enemy.shy -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo defy.enemy.shy
Processes
-
defy.enemy.shy1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4272 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/defy.enemy.shy/app_DynamicOptDex/WOfWbg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/defy.enemy.shy/app_DynamicOptDex/oat/x86/WOfWbg.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4298
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
471KB
MD566a7cc0917a7109d23c0ad105608be04
SHA1f4878879a69a3b83834fbccfe84efb73f493eb34
SHA2560dc61ebab7a94e9c70a475f30c5af8674af5e870c465bf0a6eb25ca1bf37386f
SHA512a53434903e86326e009a50b9dcab1b427408d7fd5bfc434dc93bddd8d4cb3f29d9b087613822cbd41fc8b33580890fab39b89cc826f5f823d90a535a63850a2d
-
Filesize
471KB
MD542f296c3c7ec98456d21f9c81ad1b148
SHA1c424f31c3f2a0a061968da7e58d0fa84f21e5f3b
SHA256ef636a3ba12c367fcda64b71aedf18847d4a60e370d93fcb5a42028b64854913
SHA5122274e9eec4391652efeff93bb741d177bfa3ef47796ac451e3ff0912fc95af2b8ff441dbf5c2302a46fca6d3736e23ec317a0d5d0a16a0fe2820fa26a925ac8f
-
Filesize
398B
MD5ad2b2ff0025af78ab0dea9b1c07a552b
SHA1bebaedcb594fd8526e31cea2e3397c2af1748ab0
SHA256eb74bc58f24c9b15cd7e5fe6dd7d964865296206e4c211eaaa1b19b6e5ee7509
SHA512ab20053260a779ecb7e72faf8c820c22c05f16d7ef1ba2a24ca19f8e30ab101767df077ab0ea3de41993e07972ec7857ace24a7cebbf8b2b4a75e45c472ee47d
-
Filesize
471KB
MD55732e5926139cd8289a0b506ea591d61
SHA1736e1d45e599d9b258169a78a0fce856a62c2259
SHA256aa47990b336623459ca6b29fa62834bb87955baf1e28aa3f74a29223dc537c08
SHA5125cca042776cc7b8b9ac728b3e149e01d5959276b09bb9312e0ad4b88ce59fd43f4ae6bbb99417968ab072774c59b12ef2331d1e05192b82d0b63904c27275059