Analysis
-
max time kernel
2347386s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
20/12/2023, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
7e8f5ecaacfd1d2eb2c904bc9ce2a7f2366e0b5da4a0685a77b8f126e313793a.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
7e8f5ecaacfd1d2eb2c904bc9ce2a7f2366e0b5da4a0685a77b8f126e313793a.apk
Resource
android-x64-20231215-en
General
-
Target
7e8f5ecaacfd1d2eb2c904bc9ce2a7f2366e0b5da4a0685a77b8f126e313793a.apk
-
Size
199KB
-
MD5
368f4b4d74a749ff55d76e929b52fedd
-
SHA1
313066dc7a5cd5514eaede9e709ca1ee161c74c9
-
SHA256
7e8f5ecaacfd1d2eb2c904bc9ce2a7f2366e0b5da4a0685a77b8f126e313793a
-
SHA512
7e32bad0c2c45b4828fd889aa81e6251151566b48a32165bba5ffd1a8c267f8dfd59a25737460cab5528e5907ed555ed26f01127d529032802ea79fae9e05410
-
SSDEEP
6144:nADJ+dIt4n5FQgG9gTu5grC8mJHbdjm+Ax5oNNZox1AI4h7:AdMn54i65qmJkpqPIA7
Malware Config
Extracted
octo
https://s22231232fdnsjds.top/PArhFzp5sG2sN/
https://s32231232fdnsjds.top/PArhFzp5sG2sN/
https://s42231232fdnsjds.top/PArhFzp5sG2sN/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_octo -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.stilldifferv Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.stilldifferv -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.stilldifferv -
pid Process 4261 com.stilldifferv -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.stilldifferv/cache/ziwnopuf 4261 com.stilldifferv /data/user/0/com.stilldifferv/cache/ziwnopuf 4261 com.stilldifferv -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.stilldifferv -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.stilldifferv -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.stilldifferv
Processes
-
com.stilldifferv1⤵
- Makes use of the framework's Accessibility service
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4261
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483B
MD54a2780b973db5f8df3065e99f70a290b
SHA15ff6648d6ecb7fef23a0788e45616fd2239f8334
SHA2561e3e0472e5c6958665d7c3211e59651c8cc2c0838c1073eb423f24149ccd93d3
SHA512118da4d8c50dd701506f231ef694ed423557f56ed0e9bf18de21358c50a740694771d8c965bd60e58cf1b01db57550cde59d0702fc29439a8d87702367c1962c
-
Filesize
156KB
MD5be6844567b153cf52b2cbe98c38f6bb1
SHA1044bd3e6d4d3cd56821310a2779c60822d739401
SHA256b04028e3fee62c135ff0803bc71bb3c1b6339ff8bd7141b590178e7337cf4d8d
SHA512fb4590fd902cc69ac8ab7f2144427369c786a5f6341bc96f5805eaa277ed2396648bbc12bfc61ab79265c99ae368b96807b4673e4df22788c2b677114e3accae