Analysis
-
max time kernel
2252867s -
max time network
149s -
platform
android_x86 -
resource
android-x86-arm-20230831-en -
submitted
11-09-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
371a2fca3dd65de1912c2268c301bf28326a806257807b6bd3202f7e5a41c48f.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
371a2fca3dd65de1912c2268c301bf28326a806257807b6bd3202f7e5a41c48f.apk
Resource
android-x64-20230831-en
General
-
Target
371a2fca3dd65de1912c2268c301bf28326a806257807b6bd3202f7e5a41c48f.apk
-
Size
541KB
-
MD5
c634d708b3ce7a7e460da9d41525be00
-
SHA1
8bc9ef7bae7d846c7c0c3479703980d7b056e349
-
SHA256
371a2fca3dd65de1912c2268c301bf28326a806257807b6bd3202f7e5a41c48f
-
SHA512
0ba47d74cef1de835c1b69feed56e294dcd882e300d05ad939ce4b4e453c5a31abd02b59f2eea45f8b7efe9b22b4582874df3a6aa097b46b78bda25a16c27bf5
-
SSDEEP
12288:gXgwLZWgshwFRCj2WYIBG0/bcl+YGSwy0ZSy:gVLZbNFRCjgI40iCn/
Malware Config
Extracted
octo
https://79.110.62.118/YTFlMzViNjNiNWM3/
https://3yamacfirarda22.xyz/YTFlMzViNjNiNWM3/
https://5yam7acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://5yam4acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://5yam8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://5y3am4acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://6ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://7ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://8ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://9ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://15yam4acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://25yam8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://35y3am4acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://66ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 3 IoCs
Processes:
resource yara_rule /data/data/com.portcertaina/cache/akwuhpgsnnbnx family_octo /data/user/0/com.portcertaina/cache/akwuhpgsnnbnx family_octo /data/user/0/com.portcertaina/cache/akwuhpgsnnbnx family_octo -
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.portcertainadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.portcertaina Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.portcertaina Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.portcertaina -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
Processes:
com.portcertainadescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.portcertaina -
Processes:
com.portcertainapid process 4149 com.portcertaina -
Acquires the wake lock. 1 IoCs
Processes:
com.portcertainadescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.portcertaina -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.portcertainaioc pid process /data/user/0/com.portcertaina/cache/akwuhpgsnnbnx 4149 com.portcertaina /data/user/0/com.portcertaina/cache/akwuhpgsnnbnx 4149 com.portcertaina -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.portcertainadescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.portcertaina -
Removes a system notification. 1 IoCs
Processes:
com.portcertainadescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.portcertaina -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.portcertainadescription ioc process Framework API call javax.crypto.Cipher.doFinal com.portcertaina
Processes
-
com.portcertaina1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Removes its main activity from the application launcher
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4149
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
450KB
MD5170cded6d0765ce83696b7f78ad0d82c
SHA19776247ab462347823fbdb3a4e31a2d0f13d5f6e
SHA25627650b809d2bfba1acd2354e4aeae5c1faf0351d69a0a1441d51659b9937cf64
SHA5128557b182046eac2572eb0887ef387da5d7d650697a020edd5ccfb494fefc74dc75dae6d0ffa4505dee2b356137c5e5c00440fd80bba62a2268097933478d03eb
-
Filesize
494B
MD5e8eee71c25678aa51aa05300fcae7b0a
SHA199bd788c3e3b4b696f0957e1497fa21408a01204
SHA2567271b830d01bb01f949737eb0654623b01856d1b3017f1ef21cd458b642091b4
SHA5129dc9b821349e09876d0669676362403d373d46d9fd995c9486f180b3271dfbece7e9c63fa0475fa07bc136e94fc8a5a79b805e6d8ab30a5c218981e4f68a5107
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
63B
MD5e804460b78424a96902e8dcdd2ddb758
SHA16f3898489c537f88014d276b28639b5bde8f5b59
SHA25608da707ed4fef038ddccaae288547d6d5762b376a662613de89a19e7daeca948
SHA512097254d7f5c9711195159af23fba6db8b74ee55c62fc961928ceee672112891b57a620672398dc2756880a2a8f156aec7f19e871c492196476b9e6fbb7a36496
-
Filesize
234B
MD57df10fe12b6867d0f8649ffd2b80182f
SHA19b0bd1206ffdf25ed255a617af54855f50c297a4
SHA256914df1c68c91d182a23b12afa061564171f6b1e270667d7dce97afbd638db5d6
SHA5125df93819ecf18215e8b89e6985575f220d455035ca622615767f3e1b2c9befeca5f408f86ccc23eab15459a4fbc5c7b15064f81306a40af141338c4bf581dd1d
-
Filesize
63B
MD5604ef2bbd5c30c5a554a12a237cff709
SHA1d48bf3bb663d3454199b3229b6cf1b3a905f7d43
SHA256b35cfd86156abb0fb07c188cc45474957184d60aa729bbd8354d85b205f95064
SHA5120ab6952012eca769c0e276e1a98a6daa38a0d1294421b72d3772351ff944b5a9603adb49692136bc61280424f66f805d28d8af33adc2a9bafe2eee478edd351c
-
Filesize
431B
MD595fd63a61a78d9ab694ff93a83a6e729
SHA193226d281d5efcd8ed503575fe6dcfed70518faf
SHA2565f8850e96b14e7c81ee75f1f08a28a6ef47c55c0e37af7a55499db947a5bb393
SHA512ba62be9094622d01ac5e30420160b9da20527087476ebf55dcf898dbfbb443c49d667df9f7f9f1b9ab988674c955aa56be002e8831bfc7e329baab88a5b4158f
-
Filesize
450KB
MD5170cded6d0765ce83696b7f78ad0d82c
SHA19776247ab462347823fbdb3a4e31a2d0f13d5f6e
SHA25627650b809d2bfba1acd2354e4aeae5c1faf0351d69a0a1441d51659b9937cf64
SHA5128557b182046eac2572eb0887ef387da5d7d650697a020edd5ccfb494fefc74dc75dae6d0ffa4505dee2b356137c5e5c00440fd80bba62a2268097933478d03eb
-
Filesize
450KB
MD5170cded6d0765ce83696b7f78ad0d82c
SHA19776247ab462347823fbdb3a4e31a2d0f13d5f6e
SHA25627650b809d2bfba1acd2354e4aeae5c1faf0351d69a0a1441d51659b9937cf64
SHA5128557b182046eac2572eb0887ef387da5d7d650697a020edd5ccfb494fefc74dc75dae6d0ffa4505dee2b356137c5e5c00440fd80bba62a2268097933478d03eb