Analysis

  • max time kernel
    870478s
  • max time network
    171s
  • platform
    android_x64
  • resource
    android-x64-20230824-en
  • submitted
    26-08-2023 22:02

General

  • Target

    0bf73ff0ac2e81d23a005b08f8670249528170bfbb249e38a5af809c6a56c7f5.apk

  • Size

    1.2MB

  • MD5

    7bd6540df699c795d11c5241d4011be8

  • SHA1

    72fa462dcee996c5c38f286ba604820ebe07ac20

  • SHA256

    0bf73ff0ac2e81d23a005b08f8670249528170bfbb249e38a5af809c6a56c7f5

  • SHA512

    a1f6118838bba95d666dc6ed97d97fe5c31edb4e248438999123727708c2d6d5d3b89bc30e944627c24d127794f58de4db8c1eedd7be7f2b4c69e9ab1b08896d

  • SSDEEP

    24576:j5oRkLijU3deDZiOwjUH4nmpdpA/9eb02NT0+YQPDkQ5HvE5ICaEAx1snX:99oDQzsvpdpUeblH7H5H85ICaEAx1s

Malware Config

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 3 IoCs
  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.schoolbedpcfu
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
    • Loads dropped Dex/Jar
    PID:5148

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.schoolbedpcfu/app_DynamicOptDex/TeNID.json

    Filesize

    2KB

    MD5

    1f07b020a2bb3bd319e0484627df4609

    SHA1

    e0e432b40a214ae114076bf48af30c963b1ce800

    SHA256

    7b0b149422404e0a2aa4cac44e49cb22f93c2303b97b1944c5eb8fbcf64f19ec

    SHA512

    a352c32c3cdfffa6ab32eae7ea7c27e1cd64280e9f10f8d2742f2e8a596b13e1325f0f6020ae00554f2bf7eab6407d773095763e81df7cb1f988dbda77d4d83c

  • /data/data/com.schoolbedpcfu/app_DynamicOptDex/TeNID.json

    Filesize

    2KB

    MD5

    9844c3309c16a1668dd1b69b01f3cc9b

    SHA1

    daee6cc145e166b8ec4e94c1cb4e97f096d98683

    SHA256

    c16cf8f928da59fc3bb22231991a83f68819d4d30939947cd99df135c599330a

    SHA512

    26dce88d4dfb9798f8259760949b4ec1ceed418d47a821f81a5263d212bd8e45dd9d7812802f8cf7ce4e1ebc21d5db421be3684d025ef15e92abf687677de466

  • /data/data/com.schoolbedpcfu/cache/zxvwbntqrqlvw

    Filesize

    449KB

    MD5

    01c7a83b944410a637e900ad78fe529f

    SHA1

    2874c8f0ab9cf113127a783badd3083227a07ec6

    SHA256

    0cc5ed1d2e76ebed6dbe6b80702b177e57639ee3cada1011265c51e01c7463d4

    SHA512

    9d3bad524f6b0b4304dd2e89737e0189fac11aa869ff774a0932df136f002231d1a17dbd70b1a8af371b8c4d3c1fde78a739302c60b4853dfec7a00dc4d84dac

  • /data/user/0/com.schoolbedpcfu/app_DynamicOptDex/TeNID.json

    Filesize

    7KB

    MD5

    6b55ed53d13c076562cf89ea38c5867b

    SHA1

    1269e62f95979a2d3232aaa8f80505f34a06260f

    SHA256

    d3f6896d3d470b6eca7ea89ab886ee9e43292adb509bc7c708f0d648f2cbd39d

    SHA512

    43eeff52fb1d94e841973b3e496eaa581dbd554fceb1255fedb4820de8212db6acd4943a2b0477ebdd746fe5f9228182a3c7f4ce07a469a10d3d48a12d179bdd

  • /data/user/0/com.schoolbedpcfu/cache/zxvwbntqrqlvw

    Filesize

    449KB

    MD5

    01c7a83b944410a637e900ad78fe529f

    SHA1

    2874c8f0ab9cf113127a783badd3083227a07ec6

    SHA256

    0cc5ed1d2e76ebed6dbe6b80702b177e57639ee3cada1011265c51e01c7463d4

    SHA512

    9d3bad524f6b0b4304dd2e89737e0189fac11aa869ff774a0932df136f002231d1a17dbd70b1a8af371b8c4d3c1fde78a739302c60b4853dfec7a00dc4d84dac

  • /data/user/0/com.schoolbedpcfu/cache/zxvwbntqrqlvw

    Filesize

    449KB

    MD5

    01c7a83b944410a637e900ad78fe529f

    SHA1

    2874c8f0ab9cf113127a783badd3083227a07ec6

    SHA256

    0cc5ed1d2e76ebed6dbe6b80702b177e57639ee3cada1011265c51e01c7463d4

    SHA512

    9d3bad524f6b0b4304dd2e89737e0189fac11aa869ff774a0932df136f002231d1a17dbd70b1a8af371b8c4d3c1fde78a739302c60b4853dfec7a00dc4d84dac