Resubmissions
03-05-2024 05:43
240503-genrssae99 1003-05-2024 05:43
240503-gel8zage5v 1003-05-2024 05:42
240503-gejg3sae96 1026-04-2024 11:24
240426-nhtwjsfc6y 1026-04-2024 09:55
240426-lx8bdadh3w 1026-04-2024 09:35
240426-lkpy9sdf5s 10Analysis
-
max time kernel
152s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
03-05-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
1dda2398fb3c4c2aee9b2a18f0975b921cbd2809625618d7a91d174806c677b7.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
1dda2398fb3c4c2aee9b2a18f0975b921cbd2809625618d7a91d174806c677b7.apk
Resource
android-x64-20240221-en
General
-
Target
1dda2398fb3c4c2aee9b2a18f0975b921cbd2809625618d7a91d174806c677b7.apk
-
Size
509KB
-
MD5
398d22e2d522ad3b4dec483d095ab0a0
-
SHA1
57864eac5ff484b9943bb30657a5b8b521a04068
-
SHA256
1dda2398fb3c4c2aee9b2a18f0975b921cbd2809625618d7a91d174806c677b7
-
SHA512
7d4c8aad0e3ea2fda730554f4fa8220567b94cf0e6a7c3d93112ea1b0b11cc972b00b3d00346976e664cdf82d672f94185f5868df9c6b9b81b2bee9748649b7b
-
SSDEEP
12288:+f22AykQKMrEjYTYVk5B+vdosmXw91+9VYATRWcOqZUeJnPG:+55QjYTPMvdjmXw9M31W5MJnPG
Malware Config
Extracted
octo
https://tecbabbshop24578.shop/ZDQyN2NmOGEZOTIK/
https://karamdsadvs2.shop/ZDQyN2NmOGEZOTIK/
https://karakalandankasd5.com/ZDQyN2NmOGEZOTIK/
https://tecklardankalan.shop/ZDQyN2NmOGEZOTIK/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
Processes:
resource yara_rule /data/data/com.beautyship5/cache/qhqrdtmuyib family_octo -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.beautyship5description ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.beautyship5 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.beautyship5 -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
com.beautyship5description ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beautyship5 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.beautyship5ioc pid process /data/user/0/com.beautyship5/cache/qhqrdtmuyib 5097 com.beautyship5 /data/user/0/com.beautyship5/cache/qhqrdtmuyib 5097 com.beautyship5 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.beautyship5description ioc process Framework service call android.app.IActivityManager.setServiceForeground com.beautyship5 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.beautyship5description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.beautyship5 -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.beautyship5description ioc process Framework service call android.app.IActivityManager.registerReceiver com.beautyship5 -
Acquires the wake lock 1 IoCs
Processes:
com.beautyship5description ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.beautyship5 -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.beautyship5description ioc process Framework API call javax.crypto.Cipher.doFinal com.beautyship5
Processes
-
com.beautyship51⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Uses Crypto APIs (Might try to encrypt user data)
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.beautyship5/cache/oat/qhqrdtmuyib.cur.profFilesize
452B
MD52cc1de2ff82319c898c02c10a30a0fa7
SHA14bca2ced645129b7a8c4b21975807053b5046f38
SHA2560d528ccb44c61db1d612b407eed83ca5f8cbebb8700bf2b7b9225eb734355da9
SHA5128315d45eef8ce89ad4a0ac17fe4d21eba331874d525619f14cae70ec935300cb3273c00293dddc8764e221e292e573a9760bded3b1316dabb676eb7071a1f8d8
-
/data/data/com.beautyship5/cache/qhqrdtmuyibFilesize
449KB
MD57cfcfcdf2f1a2e962d3975435a55b97d
SHA10e3b3c6e167542c580dec3a674f2fc3b4e91628d
SHA256abe48a2b945177b37b9f59db9f4d8f92ea9dc991f0835b7df3191e937b6d8929
SHA512eafb08deef09f5b4644c42e9bccac724dd5ba0345f43ea5cbc4ca8286b6ee34e579fa6195fbff24ceeb5e25db521e44edd99cc4d9a5691405e0e1f71b805548a
-
/data/data/com.beautyship5/kl.txtFilesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
/data/data/com.beautyship5/kl.txtFilesize
68B
MD50a3121b57955f25d536766f2eefe3b92
SHA1c3e247c5f4a695a5d2fe7662f5312ff0d279e921
SHA256fd2af059ce625aa7dfe71b2197239c74b85e0dadf4592e9fc692ab742cee054b
SHA512da8670fc161328b6ad02f79e07ef6c22a7bf264827cb0e23a53d52d5d116cf73205052faff9460279283fd00a4bebde2f27c717000e9e43f90ac504912c0760f
-
/data/data/com.beautyship5/kl.txtFilesize
76B
MD5238c50c250a0d6fecd985c7161f4fd22
SHA11a19d8dfdfdcbaf2d7e4497c34dc3f05843112b4
SHA256984eb651a74c3f2c4457e8777165913909e53e28759f617fa9109c966ca8c669
SHA5123e73a72f294671282e398a575b952f35c795fc95717bb2a37c738ca9d37f102047e25c194dbd939429720fdcc6597012a5f63f8094423af8d4fceb4d147389ee