Analysis
-
max time kernel
2944036s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20230831-en -
submitted
19-09-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
4fc8f70c981abd205673fcff85f1f6b42e16f31f96d30c51454c6f72b1c56296.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
4fc8f70c981abd205673fcff85f1f6b42e16f31f96d30c51454c6f72b1c56296.apk
Resource
android-x64-arm64-20230831-en
General
-
Target
4fc8f70c981abd205673fcff85f1f6b42e16f31f96d30c51454c6f72b1c56296.apk
-
Size
541KB
-
MD5
3a2e1930878ae40a8c4846c4aa776f3c
-
SHA1
0d4b7ad2d45b7b4dadaee0b699747d2ec2a00486
-
SHA256
4fc8f70c981abd205673fcff85f1f6b42e16f31f96d30c51454c6f72b1c56296
-
SHA512
6e541bb6db243d3ed0ee86a2a8797e37fc35e41faaa2ac6bb9570f34f8cf0bba54a4920a1da27b72bcbc9638ee2ee444b39f8a8b15954a4e2346f7b28c601f85
-
SSDEEP
12288:unIGr/pX/5A9lHRN17f06MkFCuqOLMYcJl40G4k2b4mxkcD:gxAPH9T0VkFlqOLh7kLyO
Malware Config
Extracted
octo
https://79.110.62.118/YTFlMzViNjNiNWM3/
https://3yamacfirarda22.xyz/YTFlMzViNjNiNWM3/
https://5yam7acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://5yam4acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://5yam8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://5y3am4acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://6ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://7ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://8ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://9ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://15yam4acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://25yam8acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://35y3am4acfirarda22.xyz/YTFlMzViNjNiNWM3/
https://66ya5m8acfirarda22.xyz/YTFlMzViNjNiNWM3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 3 IoCs
Processes:
resource yara_rule /data/data/com.townkeeptyn/cache/czpvfrcaolrvwz family_octo /data/user/0/com.townkeeptyn/cache/czpvfrcaolrvwz family_octo /data/user/0/com.townkeeptyn/cache/czpvfrcaolrvwz family_octo -
Makes use of the framework's Accessibility service. 2 IoCs
Processes:
com.townkeeptyndescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.townkeeptyn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.townkeeptyn -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
Processes:
com.townkeeptyndescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.townkeeptyn -
Processes:
com.townkeeptynpid process 4145 com.townkeeptyn -
Acquires the wake lock. 1 IoCs
Processes:
com.townkeeptyndescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.townkeeptyn -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.townkeeptynioc pid process /data/user/0/com.townkeeptyn/cache/czpvfrcaolrvwz 4145 com.townkeeptyn /data/user/0/com.townkeeptyn/cache/czpvfrcaolrvwz 4145 com.townkeeptyn -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.townkeeptyndescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.townkeeptyn -
Removes a system notification. 1 IoCs
Processes:
com.townkeeptyndescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.townkeeptyn -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.townkeeptyndescription ioc process Framework API call javax.crypto.Cipher.doFinal com.townkeeptyn
Processes
-
com.townkeeptyn1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Removes its main activity from the application launcher
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4145
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
450KB
MD5fa662bb74a05ba497d78031affb3ab73
SHA12c6a309fc29fb37d7c0a5e5155a7d4fa07f1856e
SHA2565a49e4f3c5742492742fb2932c311e15d2a7c87a44de269e91d67fb5d4f849e7
SHA51221800e115bfbe456f963b425079cd4465909a3329f72b1487f77b9c8b0c255d32f1ba8d72026b96f02e02ab32eb4c999668f49699f2666df3593330feda25298
-
Filesize
449B
MD58ec62f517ca448bf38a91bb9c225f2bb
SHA1674d4b9796f368b735e34e54c24b234406575bb5
SHA256e04b736262332461a08661563434dc40d77a88e1b061b7c82eb8ec6f9ef56f25
SHA51290fe7fda7949e9624c20921b89af828fc7d832874fd2ab211baf7e3cffeaefbfbc40ea7b489c8a6f06b5eaa0762b66b70d55254b908ceeda7ff7d1c98bc5f276
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
234B
MD5a38a4cf0cfd03f57f29a7cc46aceac00
SHA15fc6b837ec74e9ea893b22295706e4f3cb8a8d4e
SHA2561119502e3ff9c3c4a8a27a2b21d8e21b2e1f36d218b18504676a3f73ac3f43eb
SHA512ca8cf48443138e7217cb80ff014d11d0a5dba48564c00c411aaed0b5b4cef44d43054a6fafcd06bf9d93c4890d57af6f2e89934f8d3fd8e73d8f8075f24e5274
-
Filesize
63B
MD59911688359d0d6cfa3d280d3fda8d5d9
SHA1e58c29e6cd306aa1490d26a0abfbecc712e1c085
SHA25624f6eeef7a286067520803c4ac845c9d126c9d35928851d20740f14adf9f38c9
SHA512e50871296a1db22a0f3821b847001d963e32f56a114e10fb6bd8cbe6002b25f6dbc91acf847c59c6a3e76053407c78aacef01eb38ed2ccf0b7d3001a2f1c7b31
-
Filesize
54B
MD512a102c20c11c74dc23088bfefd47deb
SHA11ed7cbc3be1e7b5c37229d502197b819e53c0814
SHA2565e8e8576512609375f0fac5db1ab348f7bc388c19990858985fa2de763536a5c
SHA51262e695359081b510b436ec9e05f82c5621b09e3cf75cc20cc7978623e6e19bf1b5c7ec7eea82c4099dd17e61169c8902b43841ab3c19861ca7bb9e381a5562da
-
Filesize
431B
MD5f4e04d2c4ec44bf06589accb7d2ed872
SHA1bf208f88e163ab1fa5177d11be3ca23e26462c65
SHA256c5f29946b28e5bf0965aab0eecdd35653ddfbc663271745558bf10d112e71e86
SHA51278c3c1f4461cfcdab408b9801dab709645d2ab001cb59184c18c4d2e24687b7117cb4a5eaaf041b4206f6770bf09b28f87ca37e50a686feac07af789c2fbc37d
-
Filesize
450KB
MD5fa662bb74a05ba497d78031affb3ab73
SHA12c6a309fc29fb37d7c0a5e5155a7d4fa07f1856e
SHA2565a49e4f3c5742492742fb2932c311e15d2a7c87a44de269e91d67fb5d4f849e7
SHA51221800e115bfbe456f963b425079cd4465909a3329f72b1487f77b9c8b0c255d32f1ba8d72026b96f02e02ab32eb4c999668f49699f2666df3593330feda25298
-
Filesize
450KB
MD5fa662bb74a05ba497d78031affb3ab73
SHA12c6a309fc29fb37d7c0a5e5155a7d4fa07f1856e
SHA2565a49e4f3c5742492742fb2932c311e15d2a7c87a44de269e91d67fb5d4f849e7
SHA51221800e115bfbe456f963b425079cd4465909a3329f72b1487f77b9c8b0c255d32f1ba8d72026b96f02e02ab32eb4c999668f49699f2666df3593330feda25298