Resubmissions

03/11/2023, 03:44

231103-eapr7ade77 10

14/08/2023, 23:16

230814-28586afg99 10

14/08/2023, 23:14

230814-28bpjshh6t 10

14/08/2023, 23:13

230814-27c6zsfg95 10

14/08/2023, 04:43

230814-fcfsqshe37 10

14/08/2023, 04:42

230814-fbpz1she28 10

13/08/2023, 13:51

230813-q5sccach63 10

13/07/2023, 06:05

230713-gtdv5sfe43 10

Analysis

  • max time kernel
    4132874s
  • max time network
    51s
  • platform
    android_x64
  • resource
    android-x64-20230621-en
  • submitted
    14/08/2023, 23:16

General

  • Target

    com.amvery4.apk

  • Size

    1.7MB

  • MD5

    25d99eea253d09f79fb4b8d39364ed8d

  • SHA1

    8d923163764cc12fc287d81a718b4533e08f2fe9

  • SHA256

    11dcd47ea09e8c1efe551e1832c7aeea810dce127f78299fce8d72a638fd9f51

  • SHA512

    c82abf598ad8d3ac817c817496b8edeb0672d57a7771f7f707598a7c6d1ead5e282170c6da2f467b66e06f89020ab7152e6936b6b9a0c947805a55b34e9b3e25

  • SSDEEP

    24576:VuNlJrpZQO3cf8Flg0f4dpDWRghaJMpv2uQOdPq0ZmARC6LD6RCaEABDMyZF:2j4M4/a+haJqv2uQOzZ2RCaEABYCF

Malware Config

Extracted

Family

octo

C2

https://176.113.115.110/YjcyMWYzZjc5OTUy/

https://31fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://32fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://33fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://34fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://35fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://36fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://37fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://38fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://39fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://40fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://41fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://42fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://43fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://44fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://45fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://46fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://47fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://48fdghhoo11.com/YjcyMWYzZjc5OTUy/

https://49fdghhoo11.com/YjcyMWYzZjc5OTUy/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 3 IoCs
  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.amvery4
    1⤵
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4839

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.amvery4/app_DynamicOptDex/rQiZfat.json

    Filesize

    2KB

    MD5

    5c519f982df7fcab7870e7fff354c542

    SHA1

    3c524914a02e74be7e7ad881789d279855273f0f

    SHA256

    dd033abf3260f89a03caae3c1e846c68480b8fd4007a93bba6796a1c01d4f6d5

    SHA512

    352f60e27cbffc8000c8abbeb459727517b10cc6313d427b2372d792f3dd4cca46c5fc610350b6993c62da165798cb56932b631a1baa1f397bec735cd43710e7

  • /data/user/0/com.amvery4/app_DynamicOptDex/rQiZfat.json

    Filesize

    7KB

    MD5

    1ad40f1fa90afaa39a0d8e268045a6f0

    SHA1

    0709a40568c29d072dbdaa27d8a571035628d4bb

    SHA256

    9fef690c0399b32fccbcf1c5a92df2c9c8e4f025ea7dddfc4e7018f1d6805e55

    SHA512

    5344da4532028d13d70f24f7d1b61859db2192d43d240a27ba4e03893b2cb048b52167c301cf2ac92175972575da8b61a5be4379a1007515a509cc653e2fba21

  • /data/user/0/com.amvery4/cache/vnfnsmibqlol

    Filesize

    449KB

    MD5

    24cafdac8d497681aa80d3e9a8ef4e72

    SHA1

    cef8331c3a85490fa5d6c6cc18e8ac406d6c6b9d

    SHA256

    9e51a48a222bd90d32e2243aac9f53b8afcbb4bdd0d13c0d7748fa73138ab114

    SHA512

    c0c4da7f63c26a88b9ae1b90e4680d7a97db4775c27dae4f0050af747f447850adab5e0569fd43e61825dc870754723525572d45e9c1d5980f5d25b9b5659389

  • /data/user/0/com.amvery4/cache/vnfnsmibqlol

    Filesize

    449KB

    MD5

    24cafdac8d497681aa80d3e9a8ef4e72

    SHA1

    cef8331c3a85490fa5d6c6cc18e8ac406d6c6b9d

    SHA256

    9e51a48a222bd90d32e2243aac9f53b8afcbb4bdd0d13c0d7748fa73138ab114

    SHA512

    c0c4da7f63c26a88b9ae1b90e4680d7a97db4775c27dae4f0050af747f447850adab5e0569fd43e61825dc870754723525572d45e9c1d5980f5d25b9b5659389

  • /data/user/0/com.amvery4/cache/vnfnsmibqlol

    Filesize

    449KB

    MD5

    24cafdac8d497681aa80d3e9a8ef4e72

    SHA1

    cef8331c3a85490fa5d6c6cc18e8ac406d6c6b9d

    SHA256

    9e51a48a222bd90d32e2243aac9f53b8afcbb4bdd0d13c0d7748fa73138ab114

    SHA512

    c0c4da7f63c26a88b9ae1b90e4680d7a97db4775c27dae4f0050af747f447850adab5e0569fd43e61825dc870754723525572d45e9c1d5980f5d25b9b5659389

  • /data/user/0/com.amvery4/shared_prefs/main.xml

    Filesize

    129B

    MD5

    3be23d81b0180b702a47a2725e913b69

    SHA1

    69220bf27070eda071dbfb5daf1aa296f2355cb1

    SHA256

    8a06dbe0212feba5a3bf4a39ead0de9428910383b9f8e5889434d807a753172e

    SHA512

    d3c74c3c030451144ffe2b5bba6f0c12d0f2c7522fccdf07b1e66f7808d5ced4b5f6325faed72236a596a370e9a8e528116ca775eb55b5d169e309980744f001

  • /data/user/0/com.amvery4/shared_prefs/main.xml

    Filesize

    194B

    MD5

    f29f0a4ceb1d98928ffcef3d546b62bd

    SHA1

    233e824e42f1079e4ed8e4e55adbff3803ad2962

    SHA256

    4bddfde926cd99469ae24b7f11001e3943e24e06280aef81473b483d6215ffca

    SHA512

    5592fe10ac3b7cff1f53e59c72f7ffed7e0a4a1ef02194cd096d432160c9d1ee97aa650deefd3ecd352022d58cc7a5d93f35369ee8f75eaf6d75508b8557854f

  • /data/user/0/com.amvery4/shared_prefs/main.xml

    Filesize

    5KB

    MD5

    6a841b92b916d0563ed18575533753b8

    SHA1

    f5cb770af2a65014d77bc22b4ad8d8c3ab7d4963

    SHA256

    3db003bab2f16259dbd3085b775aa18fa7e2fdc4c64964c141caa82b1841e585

    SHA512

    dbaedd0b0af2ba6a33cbbda7390b1e6ad6cdbda141ce52099a48e16b14dd2c9a9350def5dfe4e39692b6c701f258a770eb9d16eb47577e77dbc642af03643c3f