Analysis
-
max time kernel
150s -
max time network
158s -
platform
android_x64 -
resource
android-33-x64-arm64-20240229-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240229-enlocale:en-usos:android-13-x64system -
submitted
16-04-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
267881e350f43a023f67d859b74a2cfbfddb624e08ebdbe72b12b753c91f95a1.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
267881e350f43a023f67d859b74a2cfbfddb624e08ebdbe72b12b753c91f95a1.apk
Resource
android-33-x64-arm64-20240229-en
General
-
Target
267881e350f43a023f67d859b74a2cfbfddb624e08ebdbe72b12b753c91f95a1.apk
-
Size
509KB
-
MD5
4ac402cc8851ed8aaf88552e5e839fbd
-
SHA1
c850f9fdd0cfd059feae236055e6ba8182a980cd
-
SHA256
267881e350f43a023f67d859b74a2cfbfddb624e08ebdbe72b12b753c91f95a1
-
SHA512
11bdde24b6f218f73de52ee98d4828d3a91f77715e7bb163e30a9f8b8381f6c05e84680d3037fc97b9aa466770e068df22cb588acdf5a4069270d23190b42241
-
SSDEEP
12288:VnUNeI9KcLvYhHSHzTZkdMpRkPY8SUHNPSpnznu:ZKX9KcLewTcKkPY9UHNPoznu
Malware Config
Extracted
octo
https://kapandayarankal.shop/MjM2YTBkOGJlZjU1/
https://kanepedeyatan.shop/MjM2YTBkOGJlZjU1/
https://kapandayarkarnaval.shop/MjM2YTBkOGJlZjU1/
https://karakasabadakan.online/MjM2YTBkOGJlZjU1/
https://karakamazandar.com/MjM2YTBkOGJlZjU1/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.appearmy9/cache/nhcaftnm family_octo -
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.appearmy9description ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.appearmy9 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.appearmy9 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.appearmy9ioc pid process /data/user/0/com.appearmy9/cache/nhcaftnm 4254 com.appearmy9 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.appearmy9description ioc process Framework service call android.app.IActivityManager.setServiceForeground com.appearmy9 -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.appearmy9description ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.appearmy9 -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.appearmy9description ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.appearmy9 -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
Processes:
com.appearmy9description ioc process Framework API call javax.crypto.Cipher.doFinal com.appearmy9
Processes
-
com.appearmy91⤵
- Makes use of the framework's Accessibility service
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.appearmy9/cache/nhcaftnmFilesize
449KB
MD58dcb8d7b69f347c7d9265346a97b0d2a
SHA113c8d2e31784194c849ee9a53764b223e6eb0bc2
SHA256229879badc048cfb10787343e337c3d97968247ab349feb18f72f638824c79da
SHA51229224181b80231847907474427af4e2728274ffb87b4be763e476620f1d4c405af3b2629fae53022b28963b92eab88de1e43d8e900cb2b3275e07427d48a3817
-
/data/user/0/com.appearmy9/cache/oat/nhcaftnm.cur.profFilesize
392B
MD5d61a8ac4dbad336c3799a55b081a5164
SHA131f78cfc43b93a69ae30d27ed323fef8c508b583
SHA256ebbb75aa8bd34507a266682eb009635f518bbabc11f55f7c269535ac703705ae
SHA512eac113f70ff4af72b0978a3adfe9c69486b05bcf934e9163a12009a52307ace4d7960132d85d334e14237cb366674d2b343c1fe785a0f9782b1412264f4eb2fc
-
/data/user/0/com.appearmy9/kl.txtFilesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
/data/user/0/com.appearmy9/kl.txtFilesize
221B
MD5483a2382e3e7421c2fd6e13b779051f9
SHA178abc4d354b709cab14627e35f19c57ce6b8ae4d
SHA256a66792370662f2d3e1a8959ba21d546af6d7bfdd0ccb51bb079f8040e1fa0d52
SHA5129c7e7d1f4572c66444346f0d4d8db7dbdf236f3c67acac7c016e864f90aa2855fd5b2db16db19cb85bb0eae058643b8e31f2fc0977590955ff152a9ac4661263
-
/data/user/0/com.appearmy9/kl.txtFilesize
60B
MD51d1a2e91cb14111b8a4be9869687d803
SHA1164ef15f981f21b0ddd51bba930f0c501913fc1b
SHA25612b5c899fc4ba82fecff0fb824f53ba30c2939d09c32070940d88910d40b308c
SHA51274820f4959ff308a7f7ca4063e068e4dcfdd5eb5cd636e2cbec4778b6e250cf143bf5cea2fdc045f1089796e9563a54bc15d84a826aa939624765df9c9700908