Analysis
-
max time kernel
377432s -
max time network
154s -
platform
android_x64 -
resource
android-x64-arm64-20230831-en -
submitted
09-10-2023 22:06
Static task
static1
Behavioral task
behavioral1
Sample
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e.apk
Resource
android-x64-arm64-20230831-en
General
-
Target
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e.apk
-
Size
541KB
-
MD5
c214de79730dd70ab52a43621404fb93
-
SHA1
7e983ae4ced9acc5da73f040f252ba61a759dd8c
-
SHA256
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e
-
SHA512
886e68039960666703928d46c1230dd626758a0bda227d6883c58f6300f6c716c53f9f7e5d06f0c802180894f0f77b2f806adc7e95f80bbdae0014038327820a
-
SSDEEP
12288:40TiRBZVgrda7IVdmFfK0nqqQi4WUUksOUerW87nH:4sEZVghsfEqQi/U9HrWenH
Malware Config
Extracted
octo
https://213.109.202.154/MWMxNzg0YzJjZTVh/
https://yamacreklam232.net/MWMxNzg0YzJjZTVh/
https://y3macreklam232.net/MWMxNzg0YzJjZTVh/
https://y4macreklam232.net/MWMxNzg0YzJjZTVh/
https://y5macreklam232.net/MWMxNzg0YzJjZTVh/
https://y7macreklam232.net/MWMxNzg0YzJjZTVh/
https://y8macreklam232.net/MWMxNzg0YzJjZTVh/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 3 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_octo behavioral2/memory/4557-0.dex family_octo behavioral2/memory/4557-1.dex family_octo -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.aboutorderpzqz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.aboutorderpzqz -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.aboutorderpzqz -
Acquires the wake lock. 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.aboutorderpzqz -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.aboutorderpzqz/cache/khcqegiz 4557 com.aboutorderpzqz /data/user/0/com.aboutorderpzqz/cache/khcqegiz 4557 com.aboutorderpzqz -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.aboutorderpzqz -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.aboutorderpzqz
Processes
-
com.aboutorderpzqz1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data).
PID:4557
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD512980affd183b3bcdef75eff9b50a39e
SHA1c80c2ec7b2062bb8d7a1d2da61dfdfbf236401a9
SHA256eff1f92250bee18564fa4d81ea75baef9fde5af232333b32a0d7066532f39898
SHA512badf6103dcefa2279453f5964be05ed2c43f303a512774aa3d6289106ca83b9cbb22f116031dfa4846399fb55a5d8be19c8912e55a0d936c6680e68b42d91b5f
-
Filesize
450KB
MD512980affd183b3bcdef75eff9b50a39e
SHA1c80c2ec7b2062bb8d7a1d2da61dfdfbf236401a9
SHA256eff1f92250bee18564fa4d81ea75baef9fde5af232333b32a0d7066532f39898
SHA512badf6103dcefa2279453f5964be05ed2c43f303a512774aa3d6289106ca83b9cbb22f116031dfa4846399fb55a5d8be19c8912e55a0d936c6680e68b42d91b5f
-
Filesize
450KB
MD512980affd183b3bcdef75eff9b50a39e
SHA1c80c2ec7b2062bb8d7a1d2da61dfdfbf236401a9
SHA256eff1f92250bee18564fa4d81ea75baef9fde5af232333b32a0d7066532f39898
SHA512badf6103dcefa2279453f5964be05ed2c43f303a512774aa3d6289106ca83b9cbb22f116031dfa4846399fb55a5d8be19c8912e55a0d936c6680e68b42d91b5f
-
Filesize
307B
MD5d0a7790413baa0e328f3ef56ed0604aa
SHA13b6a0aa7d0bd1b4ea4035ae5c0b68015b7e58149
SHA2564a079fba5e7f54d755a23b33a830cf1c1ffb7512b6baed0527b0902e3a5f5e36
SHA512432db2e759c2c9f2c7630776840f88e1980e5331a159efcb23281fd7090352242ac904cc4a5e21c426ccb53b9c78684568cdef62a637883d0a1a5ef99d95a0db