Resubmissions
05-08-2024 12:08
240805-pa55aavhjp 1002-08-2024 15:48
240802-s893nszfkj 1003-01-2024 17:25
240103-vzshdabae6 1024-12-2023 19:17
231224-xznwasbhh7 614-12-2023 08:27
231214-kclffacdhn 1003-11-2023 03:07
231103-dmbwesbb4s 1001-11-2023 22:00
231101-1wx7cadf5y 10Analysis
-
max time kernel
2364314s -
max time network
132s -
platform
android_x86 -
resource
android-x86-arm-20231023-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231023-enlocale:en-usos:android-9-x86system -
submitted
01-11-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
Resource
android-x64-arm64-20231023-en
General
-
Target
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
-
Size
509KB
-
MD5
60609814e43a1c814b30435f15d361ed
-
SHA1
61431ed485c98b8a291e289a7e17e8d3e6db3660
-
SHA256
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc
-
SHA512
8efba5603fd4217b9c9c96e28a69f9f262568f76d43fd959d6914694808488f089f01fa92e2d04f44d5aa0859efcfb34fb080dc7b3a49502469598ab90a662fe
-
SSDEEP
12288:KwGWfjEhy4pNodk6TZFo9nheT5BQ4YvnAu:KnWf0y4GNIsmRvnAu
Malware Config
Extracted
octo
https://84.54.50.100/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass2.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass3.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass4.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass5.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass6.net/Njk4Zjk4YjdjODY3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 3 IoCs
Processes:
resource yara_rule /data/data/com.broughtbluea/cache/pxcpq family_octo /data/user/0/com.broughtbluea/cache/pxcpq family_octo /data/user/0/com.broughtbluea/cache/pxcpq family_octo -
Makes use of the framework's Accessibility service. 2 IoCs
Processes:
com.broughtblueadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.broughtbluea Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.broughtbluea -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.broughtbluea -
Processes:
com.broughtblueapid process 4333 com.broughtbluea -
Acquires the wake lock. 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.broughtbluea -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.broughtblueaioc pid process /data/user/0/com.broughtbluea/cache/pxcpq 4333 com.broughtbluea /data/user/0/com.broughtbluea/cache/pxcpq 4333 com.broughtbluea -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.broughtblueadescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.broughtbluea -
Removes a system notification. 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.broughtbluea -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework API call javax.crypto.Cipher.doFinal com.broughtbluea
Processes
-
com.broughtbluea1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Removes its main activity from the application launcher
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4333
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
402B
MD571ae708330ec263e42ba16f23ab0222a
SHA1e370161b74a30fdc2b8364dd8c93a08202742dff
SHA2566043881654f295b026547518b5aa95b82de46ebc7b9d1e926e91983d4d0c5805
SHA512241a0e90bccbefdd61fe91169629e5263c7006ec916fc732f27807361127e2aaa98d0802f92bc2766385f5a6f236be972198b2fd272114b7a77f88a108b311c1
-
Filesize
446B
MD5a31efc3424fe746133c27573529e4d47
SHA12a1b3f6e32ab28df362ac8b25df8588d0bbeb9ba
SHA2563c955244a3b3a106d1a736d4279c3e6b72f55e365c5ddf82c552d5a6a15a47d1
SHA512b22c7c27494de211f989d84ba70480777ad80d19a50d0ba0644747f8f278631939328088c12653f8f63157ab767d70f25b3bdd191598b2fa802c423e37e7c281
-
Filesize
449KB
MD5fb15ea8794c6547c5ca8f58577e433a6
SHA147c530ac1858cbc7584429190a07c3c4313857ac
SHA256908588c8de2b52b69f30917583d91ac67f96c7682c017df3943d3979c9fc6095
SHA5129cb724a385917e949052b84be546cd61a952474ee8671743034463b356de4c5bc60732b07287c326da65c4cced7f8c8247b348bbb5abb436c86fedbcb4da90c9
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
230B
MD57e0789593b13efb1412e6739ef664f94
SHA17d0bb9691aa72ddc334d57dfc39f2822b7a9de5e
SHA256a0d2295f3df071208c935b2ce1f093af5840a6eb0ce34e731130e03df9f7705f
SHA5126f7cfe44de9ca218669a77bc349b870ec58d82bd77ad7e365007cd0217e88b78d6802c4cb8d140d59b8e045a3e02fe89dfa6bf1b08027b51dd2e3a2bf127d768
-
Filesize
54B
MD511f6e29af7d5e1a21f812db8c35e2363
SHA16de8930ecdea28c18b536f68d34d9df0747e05bd
SHA256c539b180155fd3dbcce60e9d87dff499e3358b7b867b9d0d678b8be69c58b744
SHA512e32c4bdfeefd151a287bf278123382f2bcc9aae480e48ef0c22fc4cf51c7197aaeed802ebb127ad0015a97d910abfb0b6f96e8cba84893e7bbad9c2c4be31777
-
Filesize
45B
MD5f81f428154ecfacb42c64f241d9efc67
SHA10d4955e0989fa78c88ef3cb1448c141e6ca01fc3
SHA2565be1422f3301f43a836ddbdeeaf7c06e4c190ce833c6d65f6a2a51fc148544b5
SHA5122ac9c454de0e692eb0371bed372a091ae8f8680fc288d647f8c8b1a596bdf03c94e5b75ab883bf462d563d99f374e3f5bdc8752e078b89db3b62589ae7c72d02
-
Filesize
423B
MD58ae46b4b0858673f2596ffc96b163208
SHA1a65e3b9987575699f4451a87fe600fc954666133
SHA2569f3514b0516fba0d66bc1cc9a453c11cd5fc52161eebf9ca8ade63a2be556606
SHA512b066c113c66ea713b82d38b9f45677232096dd070045fa7a2ec3cd71f175fe7c90200a46ee7dc5ce7bfa6776eacef3057d69b1396a236e7ddb49b6c5865827d6
-
Filesize
449KB
MD5fb15ea8794c6547c5ca8f58577e433a6
SHA147c530ac1858cbc7584429190a07c3c4313857ac
SHA256908588c8de2b52b69f30917583d91ac67f96c7682c017df3943d3979c9fc6095
SHA5129cb724a385917e949052b84be546cd61a952474ee8671743034463b356de4c5bc60732b07287c326da65c4cced7f8c8247b348bbb5abb436c86fedbcb4da90c9
-
Filesize
449KB
MD5fb15ea8794c6547c5ca8f58577e433a6
SHA147c530ac1858cbc7584429190a07c3c4313857ac
SHA256908588c8de2b52b69f30917583d91ac67f96c7682c017df3943d3979c9fc6095
SHA5129cb724a385917e949052b84be546cd61a952474ee8671743034463b356de4c5bc60732b07287c326da65c4cced7f8c8247b348bbb5abb436c86fedbcb4da90c9