Analysis
-
max time kernel
1966464s -
max time network
159s -
platform
android_x86 -
resource
android-x86-arm-20230621-en -
submitted
20/07/2023, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92.apk
Resource
android-x64-20230621-en
General
-
Target
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92.apk
-
Size
541KB
-
MD5
0331356b4fd152b94482b2b136a63c7a
-
SHA1
6182861e23b411f28b79325bb113aa2c0526482f
-
SHA256
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92
-
SHA512
2e2dec0e1abdd1d20d30dec466ee5f41fdcdc7ce965ff5347ea4982b4925ea9dbf5744164b570b2f5490cd957d2fd79d1e67bc3b9962f3f852100396dba7b203
-
SSDEEP
12288:UykRqYxsL++RDHFAe3mHwBKNU1xVBcKY2l6HiqcT+aQaLDZ:UXfxfErF5S9UHVBrY50HQah
Malware Config
Extracted
octo
https://eses432532s.xyz/ZTIyNTVmMmE1NzNl/
https://3ses432532s.xyz/ZTIyNTVmMmE1NzNl/
https://5ses432532s.xyz/ZTIyNTVmMmE1NzNl/
https://4ses432532s.xyz/ZTIyNTVmMmE1NzNl/
https://logite234s.xyz/ZTIyNTVmMmE1NzNl/
https://logit32532s.xyz/ZTIyNTVmMmE1NzNl/
https://logits432532s.xyz/ZTIyNTVmMmE1NzNl/
https://logites432532s.xyz/ZTIyNTVmMmE1NzNl/
https://2logite234s.xyz/ZTIyNTVmMmE1NzNl/
https://5logit32532s.xyz/ZTIyNTVmMmE1NzNl/
https://8logits432532s.xyz/ZTIyNTVmMmE1NzNl/
https://1logites432532s.xyz/ZTIyNTVmMmE1NzNl/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 3 IoCs
resource yara_rule behavioral1/files/4189-0.dat family_octo behavioral1/memory/4189-0.dex family_octo behavioral1/memory/4189-1.dex family_octo -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.noticetopzw Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.noticetopzw -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.noticetopzw -
Acquires the wake lock. 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.noticetopzw -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.noticetopzw/cache/jibvxqniygismef 4189 com.noticetopzw /data/user/0/com.noticetopzw/cache/jibvxqniygismef 4189 com.noticetopzw -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.noticetopzw -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.noticetopzw
Processes
-
com.noticetopzw1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data).
PID:4189
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD59b008dfb5967d948056edf09e4abbf26
SHA1e11f68e09c73bc53610d5013125f801403dee329
SHA25644ebb6b15123e14ecc3c0cd4c2550ab005a7a4fcdc6ed4047c4eddbe56d59bf4
SHA512688b8eac6a235833b6bf168737aaa9d143ae2a08677e3085e086de630bfe69d1406f463b6ce7a8b8c71ab6efe22214e8ad016e81fa3ad9d091a5f1d5bca8485a
-
Filesize
450KB
MD59b008dfb5967d948056edf09e4abbf26
SHA1e11f68e09c73bc53610d5013125f801403dee329
SHA25644ebb6b15123e14ecc3c0cd4c2550ab005a7a4fcdc6ed4047c4eddbe56d59bf4
SHA512688b8eac6a235833b6bf168737aaa9d143ae2a08677e3085e086de630bfe69d1406f463b6ce7a8b8c71ab6efe22214e8ad016e81fa3ad9d091a5f1d5bca8485a
-
Filesize
450KB
MD59b008dfb5967d948056edf09e4abbf26
SHA1e11f68e09c73bc53610d5013125f801403dee329
SHA25644ebb6b15123e14ecc3c0cd4c2550ab005a7a4fcdc6ed4047c4eddbe56d59bf4
SHA512688b8eac6a235833b6bf168737aaa9d143ae2a08677e3085e086de630bfe69d1406f463b6ce7a8b8c71ab6efe22214e8ad016e81fa3ad9d091a5f1d5bca8485a
-
Filesize
133B
MD5baee19d7f89602a967859ad5955bb19c
SHA175da769464dfaf928a0f66eed444b6134b561ebf
SHA256cebc9bec6859a51207597a4423a78444d3c6b01a4f900fae1e7860313c321768
SHA512ebab57225e2d83151573737f9ff3a9f72d9f1bd02f639d3a4c4335903f983a2645a66d8f0a13ad0313fad9a6d2d5bb26462ca5847adee89202ea874f35931cec
-
Filesize
202B
MD5fe1f3581f415f51dad0ca7e595e9122a
SHA11869c3c2496084e43a4c45dab331aa3774c93846
SHA25662eb2b44c73a015c0b27caea1ce262ec8a2ab53c9a94eb09d8c796db88ff02c1
SHA5128a8b2e14cd3dc27d87a3fd40dfefdf8b622e7796a6fc1b7ec53c011475de52823544201a3c9a8f552163a5fe81d6bc0dc3efba5d2614295a165732e5193d683d
-
Filesize
3KB
MD535da630573b96efcc81f5b49083209e4
SHA1871497cf0aab1799c0d021ecd53773e2e1055c10
SHA256ac604f2bf80bb70ffc92747e44c540c9c3d5a712fefb08941c12cd3c765d7310
SHA512151009b8934a12c3ce0f5790aa1ef9a8cef7302a56768d9d9227a6474ec5f4abd8d4dcec81e785c526330f71b3303b217e82d2dbf4f2f2e01947acce5665aa45