Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    13-11-2024 22:04

General

  • Target

    6b2008c12685f4aaf69941e466ce7f6771c6adee4f89781fc075eb12a849bbe3.apk

  • Size

    2.4MB

  • MD5

    82965ab48ed8407cccd043a2ed3a1316

  • SHA1

    b55c7e389ac283d94ed91e79641a6b7092c1602e

  • SHA256

    6b2008c12685f4aaf69941e466ce7f6771c6adee4f89781fc075eb12a849bbe3

  • SHA512

    01fd232d8d7d16d72f947dfb85cc76eda9aefffd881da92620b5ac352cd5532b86450f09404c4efac282dbd58b092100172f63543e0fbcac5e346515c1d40d04

  • SSDEEP

    49152:D1TB8CPPZtO1AxgqbI1mSIa76H7y1zuq0WwiA8Fj0aJx2kuEKB/y:DxXPPZusIN/6H7y1uBBeFYaJx2knKNy

Malware Config

Extracted

Family

ginp

Version

2.8d

Botnet

mp57

C2

http://gladiatorboy.top/

http://greatduck.cc/

Attributes
  • uri

    api201

Extracted

Family

ginp

C2

http://gladiatorboy.top/api201/

http://greatduck.cc/api201/

Signatures

  • Ginp

    Ginp is an android banking trojan first seen in mid 2019.

  • Ginp family
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • child.physical.fruit
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4456

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/child.physical.fruit/app_DynamicOptDex/BD.json

    Filesize

    484KB

    MD5

    6858907cdcd9c4d7ab90a03314e4f7ba

    SHA1

    d069fe35fc04fa961a82846030ab798da11ffedd

    SHA256

    0cddbaed10eab216d1d8d3d9509423a718f7d8eb6e17503e153e55d3cd717b0a

    SHA512

    ec865af927257b3d17f561f69a3b6a44290977befc78b8025655f7a2893812f4ec77f584f5d97d4a08ab71c3d5656ef38d1c38936b9d55568449c7d3b55e41c9

  • /data/user/0/child.physical.fruit/app_DynamicOptDex/BD.json

    Filesize

    484KB

    MD5

    b30f574aa26f93b9bea6e05cd56e49fe

    SHA1

    e7f6c5b69a1942feea0d5e0251f82d8fc2af52f6

    SHA256

    8b68004617f4097f81e80c487e006dc49cbae2173f2ba0add39213bc5a769091

    SHA512

    a43ff6d10fe0dbf0ec4d7e20360b82a3ab00d2960278da2ae93bff659585d170356e43cf7e2ae1d294769eb57eca225ea08e465796f6a22ffd555f8670034e2a