Analysis
-
max time kernel
179s -
max time network
189s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42.apk
-
Size
3.0MB
-
MD5
4d9c8d171e426d89f49db047d5ee1061
-
SHA1
23be72b44b2c572a61c4ebaf700d0c97db3df11b
-
SHA256
20b29e937cdbcb17b88244fc3c19a652e6d71699f09e7ecc37da8d1185008e42
-
SHA512
190fe1c3353d85ff2cb232731f263f999418615c5cd3a59e7848dfe46ac171d9318c31150ccd9d501861da3b1eba8eb039a3ea32b1accce114430efebbc2925f
-
SSDEEP
98304:kQDhK6Xihgu5YBQpZiU8ySyhzG3LvEms7mzwyv:koHiqaYB7jyhK3jhsEwyv
Malware Config
Extracted
ginp
2.8d
mp68
http://crawlbone.top/
http://jackblack.cc/
-
uri
api201
Extracted
ginp
http://crawlbone.top/api201/
http://jackblack.cc/api201/
Signatures
-
Ginp
Ginp is an android banking trojan first seen in mid 2019.
-
pid Process 4601 welcome.armed.welcome -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/welcome.armed.welcome/app_DynamicOptDex/OQUjbL.json 4601 welcome.armed.welcome /data/user/0/welcome.armed.welcome/app_DynamicOptDex/OQUjbL.json 4601 welcome.armed.welcome -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId welcome.armed.welcome Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText welcome.armed.welcome Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId welcome.armed.welcome -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock welcome.armed.welcome -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground welcome.armed.welcome -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction welcome.armed.welcome android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction welcome.armed.welcome android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction welcome.armed.welcome -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo welcome.armed.welcome -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS welcome.armed.welcome -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS welcome.armed.welcome
Processes
-
welcome.armed.welcome1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4601
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD58b8b22ca3526607a4309e474051eff69
SHA1e8ca20dd5f8ed456b7fcf0687354924cc2a46e54
SHA25691d499ee392554b7215d3a3db07faa0bb55a0eee3efad6ae184cb08d413f5c32
SHA5126ea3a9ff85a454201f8157da2802d26157b5c822a72ceab46dc7f3aae5158c6b63ef301ac84e7e58719db1ba7bdd886dcd6e52688e032a9b0e81ade611f2e485
-
Filesize
436KB
MD53a22f6c8f15d9d41c2d469d81b4d0f73
SHA109bb86bb9afa69e0893f2f8a9489b4558209934a
SHA2569a5d3ae88a06c6dc6696f3fe67c54d87464ce9451030753617bf0801e6858373
SHA5126929e27a6fbb277c94bcc9e6c68344e8b9738475ab70eab6bb475309f4ce49ed4fb57e193fbbca9b3bd612112f2216cc014d843c704e07c1962162c3e97eede1