Analysis
-
max time kernel
179s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
06-08-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
1467d2ecd513e319a32c42d85d6087cc4c6d0e5f7460bd0c2c997b86a56e3c31.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1467d2ecd513e319a32c42d85d6087cc4c6d0e5f7460bd0c2c997b86a56e3c31.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
1467d2ecd513e319a32c42d85d6087cc4c6d0e5f7460bd0c2c997b86a56e3c31.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
1467d2ecd513e319a32c42d85d6087cc4c6d0e5f7460bd0c2c997b86a56e3c31.apk
-
Size
2.7MB
-
MD5
4429db8d2ccc93686bb64ea88e1de583
-
SHA1
78ac0bba6aab7e94466050d9c3ddedb7d276ec94
-
SHA256
1467d2ecd513e319a32c42d85d6087cc4c6d0e5f7460bd0c2c997b86a56e3c31
-
SHA512
1e1e596bca6b9085ad9d87bdb34ad6a3287a7a81970e560a832f872a20a8ff6f41edbc43f63457009356eb1d290702cda5df9dcd219bc299cb40628c7d07765b
-
SSDEEP
49152:RfMZIxKJf80Ca6QEl+mHsk7YG82yvH/4WJSKXXOQurvFfB+bH7IR4oWYe3a:RUZNE0CaG3H+b2yvHAWJSY1uD5BdzY3a
Malware Config
Extracted
ginp
2.8d
mp43
http://sorryfordelay.top/
http://silverball.cc/
-
uri
api201
Extracted
ginp
http://sorryfordelay.top/api201/
http://silverball.cc/api201/
Signatures
-
Ginp
Ginp is an android banking trojan first seen in mid 2019.
-
pid Process 4973 tuna.street.zone -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/tuna.street.zone/app_DynamicOptDex/uxuLY.json 4973 tuna.street.zone /data/user/0/tuna.street.zone/app_DynamicOptDex/uxuLY.json 4973 tuna.street.zone -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId tuna.street.zone Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText tuna.street.zone Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId tuna.street.zone -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock tuna.street.zone -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground tuna.street.zone -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tuna.street.zone android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tuna.street.zone android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tuna.street.zone android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tuna.street.zone android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tuna.street.zone android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tuna.street.zone -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo tuna.street.zone
Processes
-
tuna.street.zone1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
PID:4973
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD5e7d69a5c981c94e525b745c0d1996644
SHA1522d07ccd7b9cde77a503d3c6bb36575e1518496
SHA256ba7dcf9c5c1c86b46840cdfaead748c6e55352d4bc6c3ef435614a8c578654da
SHA5124304ebaf994b97b651784120a2eb45da5131e2961a9d0990a411a8220e6984614f7b7a62f3281ecae2678f161be2ce3598666c87b605f3da7e879ef0f03e7d36
-
Filesize
439KB
MD5e4ef97ecc623a5a49ed516c5cc29cf10
SHA10ea6fcc541022187229bd7570208097469d8f784
SHA2569e4ec759e14c6361e99d98af750d5ab7ff15ab767c5fdf921cbb81b4c2e4c7b0
SHA5123e2ae1ebc26c8cbc47a2faecb37e5d04d01b98050b5736fff63f592183d191afc9adeb3af9c07c081eb1029f7d016a87eccc61bef91efc83e2524d83371bb561
-
Filesize
439KB
MD52d1edb7e536bedb6193ad7c6340994e3
SHA18f9e08113c12e0fbdef1d87d6d559a7a259aae3f
SHA2562eb443f553c850fbf433dc10604b1fbf6cc40db7088ad3beabf283e9718065a2
SHA512a0c51715dd08c0e7c6474dce868943ea40b47cf868c325c7ba6378c1d0c837d154217dcf6f6ff130270e412897498cc7eaab390c5efcd01369f86ddfb894439a