Resubmissions

03-05-2024 05:43

240503-genrssae99 10

03-05-2024 05:43

240503-gel8zage5v 10

03-05-2024 05:42

240503-gejg3sae96 10

26-04-2024 11:24

240426-nhtwjsfc6y 10

26-04-2024 09:55

240426-lx8bdadh3w 10

26-04-2024 09:35

240426-lkpy9sdf5s 10

Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240221-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system
  • submitted
    13-04-2024 22:00

General

  • Target

    1dda2398fb3c4c2aee9b2a18f0975b921cbd2809625618d7a91d174806c677b7.apk

  • Size

    509KB

  • MD5

    398d22e2d522ad3b4dec483d095ab0a0

  • SHA1

    57864eac5ff484b9943bb30657a5b8b521a04068

  • SHA256

    1dda2398fb3c4c2aee9b2a18f0975b921cbd2809625618d7a91d174806c677b7

  • SHA512

    7d4c8aad0e3ea2fda730554f4fa8220567b94cf0e6a7c3d93112ea1b0b11cc972b00b3d00346976e664cdf82d672f94185f5868df9c6b9b81b2bee9748649b7b

  • SSDEEP

    12288:+f22AykQKMrEjYTYVk5B+vdosmXw91+9VYATRWcOqZUeJnPG:+55QjYTPMvdjmXw9M31W5MJnPG

Malware Config

Extracted

Family

octo

C2

https://tecbabbshop24578.shop/ZDQyN2NmOGEZOTIK/

https://karamdsadvs2.shop/ZDQyN2NmOGEZOTIK/

https://karakalandankasd5.com/ZDQyN2NmOGEZOTIK/

https://tecklardankalan.shop/ZDQyN2NmOGEZOTIK/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Makes use of the framework's Accessibility service 2 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.beautyship5
    1⤵
    • Makes use of the framework's Accessibility service
    • Checks CPU information
    • Checks memory information
    • Loads dropped Dex/Jar
    • Makes use of the framework's foreground persistence service
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4600

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.beautyship5/cache/oat/qhqrdtmuyib.cur.prof
    Filesize

    354B

    MD5

    333c1618348be22442e7cee85990a46b

    SHA1

    d0dc1e21e664255bc6405d06e1021a927a8ec23a

    SHA256

    89d59e84fec00233e60ccdfdc28f6f5a10cad0fceb517dc5cb3e326ba69939cf

    SHA512

    73798f2d393378c782b0746621feef5ea9d47c29f248358490bb77bdacb895124e56b870542e8d5e9f2c8c6c29920a7b7bbbe82a524779b51398483f5cba7eb2

  • /data/user/0/com.beautyship5/cache/qhqrdtmuyib
    Filesize

    449KB

    MD5

    7cfcfcdf2f1a2e962d3975435a55b97d

    SHA1

    0e3b3c6e167542c580dec3a674f2fc3b4e91628d

    SHA256

    abe48a2b945177b37b9f59db9f4d8f92ea9dc991f0835b7df3191e937b6d8929

    SHA512

    eafb08deef09f5b4644c42e9bccac724dd5ba0345f43ea5cbc4ca8286b6ee34e579fa6195fbff24ceeb5e25db521e44edd99cc4d9a5691405e0e1f71b805548a

  • /data/user/0/com.beautyship5/kl.txt
    Filesize

    28B

    MD5

    6311c3fd15588bb5c126e6c28ff5fffe

    SHA1

    ce81d136fce31779f4dd62e20bdaf99c91e2fc57

    SHA256

    8b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8

    SHA512

    2975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6

  • /data/user/0/com.beautyship5/kl.txt
    Filesize

    237B

    MD5

    eb59c4b3512251fd1674d2baf0f6939a

    SHA1

    21fc7c624f7797d9db0a611e5a677c234ed89690

    SHA256

    b708f40db005bfcfa251b1d602818d41acf8849f89acd3ef2b0b20a6c6eb2794

    SHA512

    256a98fe668393ec7edd2b75ae08193ab8fba941cb9a1b7ac0cc3b9584089b6dc6ee9f00a25449bdfe836414c0387bcd6bdf2e23d245d2e42ef5d8000d7faeac

  • /data/user/0/com.beautyship5/kl.txt
    Filesize

    64B

    MD5

    3c114949ae7df825602ce04a95f44ef0

    SHA1

    a2d00e53deb6cba883c8da2d75c727846feda679

    SHA256

    b0e4e59c0e26b58e0c5a2497200d7c9daafaedbb7df7ff8394e51f727cd502dc

    SHA512

    eca8f3c496aa9b6b5dd637edcd7977ff44f0452e269c31142c98b5e800d32edde2e1092c133a9cc5c1896c239efe53bdb9a2c7a97ef9f150c954d05d85ff4969

  • /data/user/0/com.beautyship5/kl.txt
    Filesize

    63B

    MD5

    83fa7c329c949baf377cd0798a8ce4f9

    SHA1

    8d08c59342a48f4e6b4352081a2e1472863d7b21

    SHA256

    1eaa97a41ecf641670a43f4fdc19531bd9fc109b1c8f584b4c1524189e1e7859

    SHA512

    b339d711de72f6bc9f81aa0b53d29adf3a37ff4984ade6f857cffc9662fe7ea82ebcb70f95ba508a96f2a49a5d401a918c42b31957c2fb46361c6c6f14d31ab5

  • /data/user/0/com.beautyship5/kl.txt
    Filesize

    480B

    MD5

    e93a572c7260b30bb31abd49dc73462a

    SHA1

    f81dea3c088ab4347337083480d174f0d1bf15b2

    SHA256

    b5937732f96f8aa60ba6a40cdee60095f07ebfd14660db73352bb960bc1085d1

    SHA512

    e482e55dd804dbcf7dc09f39060267d98dfe3ce09a95f0c4ffcfaf9bf5f78c812b7fb12e514ce804063d85b87120f685468d10a2623c89c23dd90eb8789a457a