Resubmissions

03-05-2024 05:43

240503-genrssae99 10

03-05-2024 05:43

240503-gel8zage5v 10

03-05-2024 05:42

240503-gejg3sae96 10

26-04-2024 11:24

240426-nhtwjsfc6y 10

26-04-2024 09:55

240426-lx8bdadh3w 10

26-04-2024 09:35

240426-lkpy9sdf5s 10

Analysis

  • max time kernel
    39s
  • max time network
    137s
  • platform
    android_x86
  • resource
    android-x86-arm-20240221-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system
  • submitted
    03-05-2024 05:43

General

  • Target

    1dda2398fb3c4c2aee9b2a18f0975b921cbd2809625618d7a91d174806c677b7.apk

  • Size

    509KB

  • MD5

    398d22e2d522ad3b4dec483d095ab0a0

  • SHA1

    57864eac5ff484b9943bb30657a5b8b521a04068

  • SHA256

    1dda2398fb3c4c2aee9b2a18f0975b921cbd2809625618d7a91d174806c677b7

  • SHA512

    7d4c8aad0e3ea2fda730554f4fa8220567b94cf0e6a7c3d93112ea1b0b11cc972b00b3d00346976e664cdf82d672f94185f5868df9c6b9b81b2bee9748649b7b

  • SSDEEP

    12288:+f22AykQKMrEjYTYVk5B+vdosmXw91+9VYATRWcOqZUeJnPG:+55QjYTPMvdjmXw9M31W5MJnPG

Malware Config

Extracted

Family

octo

C2

https://tecbabbshop24578.shop/ZDQyN2NmOGEZOTIK/

https://karamdsadvs2.shop/ZDQyN2NmOGEZOTIK/

https://karakalandankasd5.com/ZDQyN2NmOGEZOTIK/

https://tecklardankalan.shop/ZDQyN2NmOGEZOTIK/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Prevents application removal 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to prevent removal.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.beautyship5
    1⤵
    • Makes use of the framework's Accessibility service
    • Prevents application removal
    • Removes its main activity from the application launcher
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Checks CPU information
    • Checks memory information
    • Loads dropped Dex/Jar
    • Makes use of the framework's foreground persistence service
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4242

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.beautyship5/cache/qhqrdtmuyib
    Filesize

    449KB

    MD5

    7cfcfcdf2f1a2e962d3975435a55b97d

    SHA1

    0e3b3c6e167542c580dec3a674f2fc3b4e91628d

    SHA256

    abe48a2b945177b37b9f59db9f4d8f92ea9dc991f0835b7df3191e937b6d8929

    SHA512

    eafb08deef09f5b4644c42e9bccac724dd5ba0345f43ea5cbc4ca8286b6ee34e579fa6195fbff24ceeb5e25db521e44edd99cc4d9a5691405e0e1f71b805548a

  • /data/data/com.beautyship5/kl.txt
    Filesize

    28B

    MD5

    6311c3fd15588bb5c126e6c28ff5fffe

    SHA1

    ce81d136fce31779f4dd62e20bdaf99c91e2fc57

    SHA256

    8b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8

    SHA512

    2975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6

  • /data/data/com.beautyship5/kl.txt
    Filesize

    237B

    MD5

    9fc8fa2644f287ad7bc19c398f986eba

    SHA1

    82af8448f5929af4a299eab7e25acc24066b4a23

    SHA256

    1a477e93758d2413cf7ef8b625815962a62738d18f2c10f931499f8a814e799e

    SHA512

    0190275e5303cf67399224602ea768a85c8aab3ee75aa606ed0d00db008fc6846f4528a13b6b9b079cc899b6171865dd56ac57825fef30ccf55db27b6e2363c6

  • /data/data/com.beautyship5/kl.txt
    Filesize

    63B

    MD5

    3cd3a378a4516f848ad4a2bfac0bbebd

    SHA1

    26a6cb8ca6f08327bf44b75f8bd2fc1cc51418e7

    SHA256

    588bca6ced9ffa56fce9709854070c56078ad06c1855d8b79f7165c4fc08197c

    SHA512

    7b8123e2a4696a8082afce16cdae29812c1fdd47bdf16c608a40afeb1605ee10c60ddfc8f8430c4dfab66d342a4f4dd94a4c208a796e7aaa298ef4cc58905965

  • /data/data/com.beautyship5/kl.txt
    Filesize

    45B

    MD5

    2cf9abb5b191c3cee2f1110bf3c76b9c

    SHA1

    20e4dabb69e8a1bbfa7621dca5633d7b2e2b6d2c

    SHA256

    3efcabbb92d859d6f7ebc6b63caa4daaf06766bfa826b31b5717ff56631ebbcc

    SHA512

    207614e9e8424eaa75e075f7ae441d41d790e8ac83ea5bbc2dbd311d9ff6ef27828c58d2849b1912454dfe63dc9fda013aaf6552ea6339ed9565b1e57ed9d08b

  • /data/data/com.beautyship5/kl.txt
    Filesize

    437B

    MD5

    bb2e5fc9708f4619619e51cfbf7da5a1

    SHA1

    9d443f12a528ab211e7b0fb2c26191c1b816553d

    SHA256

    b99126b5fcaf9ce492f662c8fe6918e1527234c81c6a4b2ed9487ea7b34d724e

    SHA512

    1419716e75cebee3904a4e501e672954a555369cf600bb724d7b0cd8b0590b629c4dcfbabe055b1159b10d85c7a13abfbae79ba99dfc0be47b6834c5e8a0f069