Resubmissions
05-08-2024 12:08
240805-pa55aavhjp 1002-08-2024 15:48
240802-s893nszfkj 1003-01-2024 17:25
240103-vzshdabae6 1024-12-2023 19:17
231224-xznwasbhh7 614-12-2023 08:27
231214-kclffacdhn 1003-11-2023 03:07
231103-dmbwesbb4s 1001-11-2023 22:00
231101-1wx7cadf5y 10Analysis
-
max time kernel
1735872s -
max time network
309s -
platform
android_x64 -
resource
android-x64-arm64-20231211-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231211-enlocale:en-usos:android-11-x64system -
submitted
14-12-2023 08:27
Static task
static1
Behavioral task
behavioral1
Sample
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
Resource
android-x64-20231211-en
Behavioral task
behavioral2
Sample
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
Resource
android-x64-arm64-20231211-en
Behavioral task
behavioral3
Sample
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
Resource
android-33-x64-arm64-20231211.1-en
General
-
Target
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
-
Size
509KB
-
MD5
60609814e43a1c814b30435f15d361ed
-
SHA1
61431ed485c98b8a291e289a7e17e8d3e6db3660
-
SHA256
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc
-
SHA512
8efba5603fd4217b9c9c96e28a69f9f262568f76d43fd959d6914694808488f089f01fa92e2d04f44d5aa0859efcfb34fb080dc7b3a49502469598ab90a662fe
-
SSDEEP
12288:KwGWfjEhy4pNodk6TZFo9nheT5BQ4YvnAu:KnWf0y4GNIsmRvnAu
Malware Config
Extracted
octo
https://84.54.50.100/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass2.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass3.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass4.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass5.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass6.net/Njk4Zjk4YjdjODY3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.broughtbluea/cache/pxcpq family_octo -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.broughtblueadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.broughtbluea Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.broughtbluea -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.broughtbluea -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.broughtblueaioc pid process /data/user/0/com.broughtbluea/cache/pxcpq 4571 com.broughtbluea /data/user/0/com.broughtbluea/cache/pxcpq 4571 com.broughtbluea -
Acquires the wake lock 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.broughtbluea -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.broughtblueadescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.broughtbluea -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework API call javax.crypto.Cipher.doFinal com.broughtbluea
Processes
-
com.broughtbluea1⤵
- Makes use of the framework's Accessibility service
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Loads dropped Dex/Jar
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4571
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322B
MD55dcec8d08a005b4137c3955ca3f0b12c
SHA1ef10c892749a53f7da41dbd75e270e72a8c0ff07
SHA256cc5a8a9695390483b3cce9fea8e86513207279a9e3160cae81306bc22a3d2b29
SHA512d39218a5e74f119cbfced07d54bdd40aca822e5e5a3ee8c91a5afdee9c8d9389a13aff485a20173e5cc3f0e7e370af3a1d575b0417a5333700524a379a388b8e
-
Filesize
449KB
MD5fb15ea8794c6547c5ca8f58577e433a6
SHA147c530ac1858cbc7584429190a07c3c4313857ac
SHA256908588c8de2b52b69f30917583d91ac67f96c7682c017df3943d3979c9fc6095
SHA5129cb724a385917e949052b84be546cd61a952474ee8671743034463b356de4c5bc60732b07287c326da65c4cced7f8c8247b348bbb5abb436c86fedbcb4da90c9
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
230B
MD533b9ca3796ea599114b3e8ecb54d66e0
SHA1e23a09cda7a125b6e858502ebf2e32b84ed871bb
SHA25669d597ad7c4dd83e6af22b8fd657279a0c266b146aa1d1058c4783359972eb55
SHA512ba616d4ff6034a57ac5462c51c90f1a417ecda1885ae63ad7f4ab345385874b152b84ce9fe9fe27fba487cfd3d89c0cf468604f2ffaae0b58f0fdb41f1f95656
-
Filesize
45B
MD58321228e49a24cd5dd5ecff35e46a561
SHA18da5a864ad878ea99ba8ac4607d0546b943001a3
SHA256331d6fe2056f6b81bec90834469b002f5eb14e9811519ff4d2f9706a9f6f8d70
SHA512ddb8fc808f6a67b3b62edc947e4cba0875ced226e5469087ebddd74459e285eb6b17d4a05db57f06a2f54cc04ccea09dd4a3a67998bbdc50b218846dc083a866
-
Filesize
63B
MD5c7231439d42b2f765f565e9a61e36383
SHA1382cc6cc1f1a0ab0279547c60663f0a6916f9999
SHA256efba833a8ee0b8c19f4b2be164740de15c2ed00de103d99c402db481a2687125
SHA51270db19121dcd8015d8462b547e7eba8a24ca8c98380f235b43d3383b027f7c15580249ed1142759e763f0651a78a1f88eb544bc67565717131c4f76dfe86c6e6
-
Filesize
68B
MD5fbd41040c4541d60e30168ee49bffacb
SHA14c6c42a1927e0d4f7dbce661a9504c8d12ca26cc
SHA256a7928968fe3d44e5029ccce7d0075dd5414f5ca58b7560b0bc76eb185ef9cf53
SHA5123a9c9778ad4466d0cf58f42d3a95580355d96d35420572d5984c223f667b7a91389e3b16bd990735db356c371a9d2e05689adb856b998bcbb010347988a10c24