Analysis
-
max time kernel
1853187s -
max time network
150s -
platform
android_x64 -
resource
android-x64-arm64-20230831-en -
submitted
07-09-2023 06:48
Static task
static1
Behavioral task
behavioral1
Sample
google chrome.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
google chrome.apk
Resource
android-x64-arm64-20230831-en
General
-
Target
google chrome.apk
-
Size
1.9MB
-
MD5
206ef4d8c65e7e826cad668c0b5e122e
-
SHA1
10b3a7213d90cf8f6ddedee051e0920409f2846a
-
SHA256
59f8a393a30d1754e0ba9768aa4eaeeecdb838b79f6374061116a6cf8a0d5fcd
-
SHA512
0a86b368cfc43bc4e12df915d3c44ac6473e6cc25222e481766980e87f4191efb988f27cb0fe221355971703b83bc5999268f0c64b4a4ae650916e9d11cadc73
-
SSDEEP
49152:DYaRSfALycw1LSlZ9fLp88wNJwFdKZu6BOU3PuDT:DYaR5mOZ9Tp81fLZnBOOG
Malware Config
Extracted
octo
https://grpweufnh734bfr3.online/N2Y5ZmU3OTI5ZDky/
https://poewjehfbwery47fr.top/N2Y5ZmU3OTI5ZDky/
https://fcercvv7erwcvnrew.site/N2Y5ZmU3OTI5ZDky/
https://wevmuty56gbfdg.xyz/N2Y5ZmU3OTI5ZDky/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 3 IoCs
Processes:
resource yara_rule /data/user/0/com.lotfrontt/cache/xzhourgpnluqbd family_octo /data/user/0/com.lotfrontt/cache/xzhourgpnluqbd family_octo /data/user/0/com.lotfrontt/cache/xzhourgpnluqbd family_octo -
Makes use of the framework's Accessibility service. 1 IoCs
Processes:
com.lotfronttdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.lotfrontt -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
Processes:
com.lotfronttdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.lotfrontt -
Acquires the wake lock. 1 IoCs
Processes:
com.lotfronttdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.lotfrontt -
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.lotfronttioc pid process /data/user/0/com.lotfrontt/app_DynamicOptDex/coeKn.json 4557 com.lotfrontt /data/user/0/com.lotfrontt/cache/xzhourgpnluqbd 4557 com.lotfrontt /data/user/0/com.lotfrontt/cache/xzhourgpnluqbd 4557 com.lotfrontt -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.lotfronttdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.lotfrontt -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.lotfronttdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.lotfrontt
Processes
-
com.lotfrontt1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data).
PID:4557
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53051224099b13e258383aa7bf327a35a
SHA18ba1f27a5379d4a0a2275f19824f496cf9bef064
SHA25646d3184df4dec112099743876f4c96e578c3be138fda643297c591c9e89a67f8
SHA512bf6221ddcc640c689d2bae82aabdf0f4ab6ef76272a51a49616a9624dfd7942969464a892b1dd0f7d91b40d11250e30d879eee7564b64a60dfa310138eef5e8e
-
Filesize
2KB
MD5c8ef4028c434255d8ec9c0f71545d4dd
SHA1a877a99140fada99e4eee4f8abdbdb7dae5216e2
SHA256023a80612def66c1b1a8304d2337edaf53c8b33f042f2e4ce4d2add86e4e6ad9
SHA512993b7bbed729016825b1f416ce39538191c126b1f5304b0e18f799a4358e4f4abc903e1bacc795000d88eb00d68ee6368bbc96946f1c00ae668983ed9f17744a
-
Filesize
6KB
MD561cccd4a3f80a87db3ff3cf669c0c264
SHA161d9464ce446ac7104772f2d9463423b7c6fb124
SHA256bad26a30a756847d804a99d7d98757cb20ea63d669ba1c1d3c9cc35ddcaa9f78
SHA51256a97c7a730469ee7233f703b3ae4f0f676331b675fdd8bb7b006e6dadab88620294004d9048d7d59b60d4b5c556df67c49d12fa8e60e033f3955709555737c8
-
Filesize
299B
MD510deb90ca0e5ae444c665f1dcf03ba5b
SHA1ab097d210486cb2fd0786c38001e49862f443e05
SHA256ea615cba9c41989f189562a7eb4f9e4b291057c4b62e86c9de327baa7b365351
SHA512fedda5e72307413e9c5d978de575a282fd7c5f10ee4b84292f290f662f0f358225b2a8142ceffe80ee5f96f8692fe287802d6a41f329de0bc3fd155ec9f66e4f
-
Filesize
448KB
MD5c37b5f3f70dcc64cae744ac5c51c73f3
SHA11e632b0f0314ffeea00c71229689154e3dffdc8c
SHA25621caa5e8a64e7e6d5e5355db951ec135a1701dd827a3e3b9a48f89da467e8579
SHA5125d478334f13674fd0e2442656b32ab549d509c2eaf5619baf6265c6d4133fb001935c140ec8425a5caa0238e787b780f87dae2a53bccf0e88ff96c7ac1ab7f65
-
Filesize
448KB
MD5c37b5f3f70dcc64cae744ac5c51c73f3
SHA11e632b0f0314ffeea00c71229689154e3dffdc8c
SHA25621caa5e8a64e7e6d5e5355db951ec135a1701dd827a3e3b9a48f89da467e8579
SHA5125d478334f13674fd0e2442656b32ab549d509c2eaf5619baf6265c6d4133fb001935c140ec8425a5caa0238e787b780f87dae2a53bccf0e88ff96c7ac1ab7f65
-
Filesize
448KB
MD5c37b5f3f70dcc64cae744ac5c51c73f3
SHA11e632b0f0314ffeea00c71229689154e3dffdc8c
SHA25621caa5e8a64e7e6d5e5355db951ec135a1701dd827a3e3b9a48f89da467e8579
SHA5125d478334f13674fd0e2442656b32ab549d509c2eaf5619baf6265c6d4133fb001935c140ec8425a5caa0238e787b780f87dae2a53bccf0e88ff96c7ac1ab7f65