Analysis
-
max time kernel
179s -
max time network
186s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
06/08/2024, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42.apk
-
Size
3.0MB
-
MD5
4d9c8d171e426d89f49db047d5ee1061
-
SHA1
23be72b44b2c572a61c4ebaf700d0c97db3df11b
-
SHA256
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42
-
SHA512
190fe1c3353d85ff2cb232731f263f999418615c5cd3a59e7848dfe46ac171d9318c31150ccd9d501861da3b1eba8eb039a3ea32b1accce114430efebbc2925f
-
SSDEEP
98304:kQDhK6Xihgu5YBQpZiU8ySyhzG3LvEms7mzwyv:koHiqaYB7jyhK3jhsEwyv
Malware Config
Extracted
ginp
2.8d
mp68
http://crawlbone.top/
http://jackblack.cc/
-
uri
api201
Extracted
ginp
http://crawlbone.top/api201/
http://jackblack.cc/api201/
Signatures
-
Ginp
Ginp is an android banking trojan first seen in mid 2019.
-
pid Process 4312 welcome.armed.welcome -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/welcome.armed.welcome/app_DynamicOptDex/OQUjbL.json 4312 welcome.armed.welcome /data/user/0/welcome.armed.welcome/app_DynamicOptDex/OQUjbL.json 4338 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/welcome.armed.welcome/app_DynamicOptDex/OQUjbL.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/welcome.armed.welcome/app_DynamicOptDex/oat/x86/OQUjbL.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/welcome.armed.welcome/app_DynamicOptDex/OQUjbL.json 4312 welcome.armed.welcome -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText welcome.armed.welcome Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId welcome.armed.welcome Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId welcome.armed.welcome -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock welcome.armed.welcome -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground welcome.armed.welcome -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction welcome.armed.welcome android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction welcome.armed.welcome android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction welcome.armed.welcome android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction welcome.armed.welcome android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction welcome.armed.welcome android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction welcome.armed.welcome -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo welcome.armed.welcome -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone welcome.armed.welcome -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS welcome.armed.welcome -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS welcome.armed.welcome -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver welcome.armed.welcome -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo welcome.armed.welcome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo welcome.armed.welcome
Processes
-
welcome.armed.welcome1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4312 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/welcome.armed.welcome/app_DynamicOptDex/OQUjbL.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/welcome.armed.welcome/app_DynamicOptDex/oat/x86/OQUjbL.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4338
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD58b8b22ca3526607a4309e474051eff69
SHA1e8ca20dd5f8ed456b7fcf0687354924cc2a46e54
SHA25691d499ee392554b7215d3a3db07faa0bb55a0eee3efad6ae184cb08d413f5c32
SHA5126ea3a9ff85a454201f8157da2802d26157b5c822a72ceab46dc7f3aae5158c6b63ef301ac84e7e58719db1ba7bdd886dcd6e52688e032a9b0e81ade611f2e485
-
Filesize
436KB
MD53a22f6c8f15d9d41c2d469d81b4d0f73
SHA109bb86bb9afa69e0893f2f8a9489b4558209934a
SHA2569a5d3ae88a06c6dc6696f3fe67c54d87464ce9451030753617bf0801e6858373
SHA5126929e27a6fbb277c94bcc9e6c68344e8b9738475ab70eab6bb475309f4ce49ed4fb57e193fbbca9b3bd612112f2216cc014d843c704e07c1962162c3e97eede1
-
Filesize
393B
MD51c680e501bdef554565e1c2f91a5adbc
SHA18c62768066e08c81b6aece643adcab1c8c93c71f
SHA256d62fb583ad7f1c34666db2f871c19ed862778bbb990cffb1e34ab852ed559a83
SHA512ec4ace9824e2beb3000749d7c7046e50e13f1971e3795c965eab9054722afb505eb03438c0eabd548f443f95ad677bf305f431fbdb9a60021ed039eb3c5d817a
-
Filesize
436KB
MD532f6e0fff0352809507dee8b931011a0
SHA13050d3b5023600ea5a61a66ddef6a01933c4688d
SHA2564d2af23a99fe3965555bd3992e2ff61bf990edb0e57fe6e8f7bdcc671440d32c
SHA5126c41c056e89bb487812c56ed76d516fe9a2591f3db09942e02fab17119685d37387616675769d89dc483b5a48f1be27b1cb7a1014419531b422f1191522f1b40