Resubmissions
05-08-2024 12:08
240805-pa55aavhjp 1002-08-2024 15:48
240802-s893nszfkj 1003-01-2024 17:25
240103-vzshdabae6 1024-12-2023 19:17
231224-xznwasbhh7 614-12-2023 08:27
231214-kclffacdhn 1003-11-2023 03:07
231103-dmbwesbb4s 1001-11-2023 22:00
231101-1wx7cadf5y 10Analysis
-
max time kernel
1735869s -
max time network
306s -
platform
android_x86 -
resource
android-x86-arm-20231211-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231211-enlocale:en-usos:android-9-x86system -
submitted
14-12-2023 08:27
Static task
static1
Behavioral task
behavioral1
Sample
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
Resource
android-x64-20231211-en
Behavioral task
behavioral2
Sample
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
Resource
android-x64-arm64-20231211-en
Behavioral task
behavioral3
Sample
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
Resource
android-33-x64-arm64-20231211.1-en
General
-
Target
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc.apk
-
Size
509KB
-
MD5
60609814e43a1c814b30435f15d361ed
-
SHA1
61431ed485c98b8a291e289a7e17e8d3e6db3660
-
SHA256
b38019f9e80c2166a4e09eed0cd15bad651263f0ff3ea26199a08896ffd8e1fc
-
SHA512
8efba5603fd4217b9c9c96e28a69f9f262568f76d43fd959d6914694808488f089f01fa92e2d04f44d5aa0859efcfb34fb080dc7b3a49502469598ab90a662fe
-
SSDEEP
12288:KwGWfjEhy4pNodk6TZFo9nheT5BQ4YvnAu:KnWf0y4GNIsmRvnAu
Malware Config
Extracted
octo
https://84.54.50.100/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass2.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass3.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass4.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass5.net/Njk4Zjk4YjdjODY3/
https://pakuxxxnatationclass6.net/Njk4Zjk4YjdjODY3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
Processes:
resource yara_rule /data/data/com.broughtbluea/cache/pxcpq family_octo -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.broughtblueadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.broughtbluea Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.broughtbluea -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.broughtbluea -
Processes:
com.broughtblueapid process 4484 com.broughtbluea -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.broughtblueaioc pid process /data/user/0/com.broughtbluea/cache/pxcpq 4484 com.broughtbluea /data/user/0/com.broughtbluea/cache/pxcpq 4484 com.broughtbluea -
Acquires the wake lock 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.broughtbluea -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.broughtblueadescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.broughtbluea -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
Processes:
com.broughtblueadescription ioc process Framework API call javax.crypto.Cipher.doFinal com.broughtbluea
Processes
-
com.broughtbluea1⤵
- Makes use of the framework's Accessibility service
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4484
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
441B
MD5f5086b4661441f7381bb000fe2fa9e25
SHA19a917db374b0613709c51bc2f879c913f36db88e
SHA2561d7b5c2205f0779f79d47f2ff85a0def161d288979c563f78369f6eb338bb760
SHA5122fe243d5e42c1f2f319cb512c28a133e2584347ccc164577c960a55b1c8b53ab0b69b9afdcba91ee41b8c7adb7036bfe78055a91d5390708def4ac6ddcee0c7c
-
Filesize
522B
MD57db15c1cc8700ad41f480f8486730e3a
SHA1312e97dd00abca3b471ac4b4df9ee51718275a60
SHA256388395885adc5cb1bad2857a0a33359c18501edcf453339d7d0875d4fb516e8b
SHA5123301c8434681239bd7bf6cf4f814a0f28377b31f8d892bed2bb7707514f14a120ceb316a010556f99f57406fd16c25ab6b3274271c4411e26b285a98449490ed
-
Filesize
449KB
MD5fb15ea8794c6547c5ca8f58577e433a6
SHA147c530ac1858cbc7584429190a07c3c4313857ac
SHA256908588c8de2b52b69f30917583d91ac67f96c7682c017df3943d3979c9fc6095
SHA5129cb724a385917e949052b84be546cd61a952474ee8671743034463b356de4c5bc60732b07287c326da65c4cced7f8c8247b348bbb5abb436c86fedbcb4da90c9
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
230B
MD5ca5b53a29fb63d49cc5f72fe5f7ed936
SHA19824274da22e4333e085cfb82c6a0088b56a200a
SHA2562a822311cbe2d104c3990dc4181e0cea4158a7accd1adc565db3efec35041005
SHA51215fc9ac256cbf3da60be6cd68c10c5c1f8c827b959beb177895b83082585529a05da0acfb64ea443b6f85b65ed19dbcefad224c3a407514e748cdc11d3f02633
-
Filesize
63B
MD591b90368d3fc4c40bb1ce122637b7e15
SHA1ea5f2767c6b13ce6a5a3041443dbcebf2d321d0c
SHA256ad24d0b7919da871adf7f800fcbfa50a5608e42b2fa08fb1a82de8eaa9105ade
SHA51231c7687eb6abbffe345f7a59fbdca764e791f640174343fde6155c04616150113fff974d1c0f47d915d5bf82424516390eebe9614e0c696f5d43c9c9e2a40099
-
Filesize
54B
MD5c02ef369483c5aa93fecd3dc5e08ef58
SHA16c87e9da559daa9870369b3ed6f64cf98d3484d8
SHA256fe86665c77a99fd59c1f9821eabe653c18a98b33b03f2e36068dce3cbf5dea3e
SHA5122c9c2babe5128f14ac7aaca3b74722938c00fe35c8c92f62d001162de5577e3bbb84197ff040b7113649eb37109105d9cfe65cc624a398fbf8e61d3f8deff004
-
Filesize
63B
MD506e7616e38e8ec31409f37e95f4eea29
SHA1dec06b8d2c039ca18f063c26fd31fa58e07651fd
SHA256a2b547f14568e7a51bf43f332db9c2f9ea7c04196576fdf4c349c66dcd343d4a
SHA512c7c94a6bc69194f2d8887baafba99a1af092f8ecc4e62b6141d276c4567c630caef1e3b7926004e2b28207e2187cb81bc9a7a9abe0a3ba30576fbab43cc6c37d