Analysis

  • max time kernel
    148s
  • max time network
    129s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    13-11-2024 22:04

General

  • Target

    6b2008c12685f4aaf69941e466ce7f6771c6adee4f89781fc075eb12a849bbe3.apk

  • Size

    2.4MB

  • MD5

    82965ab48ed8407cccd043a2ed3a1316

  • SHA1

    b55c7e389ac283d94ed91e79641a6b7092c1602e

  • SHA256

    6b2008c12685f4aaf69941e466ce7f6771c6adee4f89781fc075eb12a849bbe3

  • SHA512

    01fd232d8d7d16d72f947dfb85cc76eda9aefffd881da92620b5ac352cd5532b86450f09404c4efac282dbd58b092100172f63543e0fbcac5e346515c1d40d04

  • SSDEEP

    49152:D1TB8CPPZtO1AxgqbI1mSIa76H7y1zuq0WwiA8Fj0aJx2kuEKB/y:DxXPPZusIN/6H7y1uBBeFYaJx2knKNy

Malware Config

Extracted

Family

ginp

Version

2.8d

Botnet

mp57

C2

http://gladiatorboy.top/

http://greatduck.cc/

Attributes
  • uri

    api201

Extracted

Family

ginp

C2

http://gladiatorboy.top/api201/

http://greatduck.cc/api201/

Signatures

  • Ginp

    Ginp is an android banking trojan first seen in mid 2019.

  • Ginp family
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • child.physical.fruit
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Checks CPU information
    • Checks memory information
    PID:4373
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/child.physical.fruit/app_DynamicOptDex/BD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/child.physical.fruit/app_DynamicOptDex/oat/x86/BD.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4401

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/child.physical.fruit/app_DynamicOptDex/BD.json

    Filesize

    484KB

    MD5

    6858907cdcd9c4d7ab90a03314e4f7ba

    SHA1

    d069fe35fc04fa961a82846030ab798da11ffedd

    SHA256

    0cddbaed10eab216d1d8d3d9509423a718f7d8eb6e17503e153e55d3cd717b0a

    SHA512

    ec865af927257b3d17f561f69a3b6a44290977befc78b8025655f7a2893812f4ec77f584f5d97d4a08ab71c3d5656ef38d1c38936b9d55568449c7d3b55e41c9

  • /data/data/child.physical.fruit/app_DynamicOptDex/BD.json

    Filesize

    484KB

    MD5

    b30f574aa26f93b9bea6e05cd56e49fe

    SHA1

    e7f6c5b69a1942feea0d5e0251f82d8fc2af52f6

    SHA256

    8b68004617f4097f81e80c487e006dc49cbae2173f2ba0add39213bc5a769091

    SHA512

    a43ff6d10fe0dbf0ec4d7e20360b82a3ab00d2960278da2ae93bff659585d170356e43cf7e2ae1d294769eb57eca225ea08e465796f6a22ffd555f8670034e2a

  • /data/data/child.physical.fruit/app_DynamicOptDex/oat/BD.json.cur.prof

    Filesize

    345B

    MD5

    2f3be74d41a06cef00f6fe62a404e627

    SHA1

    fa75b7e03d610ed94ddff8789a6359aa5e7637a9

    SHA256

    2a873c9144e3c2676f9666a40fd72f0cd5cfef54037921ac3dcff6a541683fee

    SHA512

    4f74c4034f5b46283d32a687da2ddede853453a80d3b8b3a8973b9813c72d97a3d7753e27c5512ac6697c1b8da7529b07f17fee77ce4f66afa613cf6b0ce034f

  • /data/user/0/child.physical.fruit/app_DynamicOptDex/BD.json

    Filesize

    484KB

    MD5

    efc4e36b2d67b3068b5dcb8c450a3a52

    SHA1

    362caf7fa80a8028f725001ce0ab62830a0d8509

    SHA256

    496bd54ac0d920bb4cbd7f21237359f425163b6ea6172993550abad62012421c

    SHA512

    f88a2872fec7aeff253930e7e80216a89f7bde6921939112ecfa46398d88cbc68c5d259c04c60818a351872c5975b585b7181f5eed14b1b0a961970bb2ff90e9