Analysis

  • max time kernel
    179s
  • max time network
    175s
  • platform
    android_x64
  • resource
    android-x64-20240514-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system
  • submitted
    19-05-2024 22:00

General

  • Target

    6542a308501a28a604177258228439da97e1801fd9d964d21bd1a130ef09c722.apk

  • Size

    509KB

  • MD5

    91d23bae67d9f72c7b3a041ec2e872c4

  • SHA1

    7891e7520b9675784e2d731baf1f2b165deac9e8

  • SHA256

    6542a308501a28a604177258228439da97e1801fd9d964d21bd1a130ef09c722

  • SHA512

    9eb0d79e8896ee797606e9a166501273a8e3b206124d04c1ea540caa49ab965c2a22b49691e4e9425825dd8124319c5538b76e0b498d61076efa9bfc49d66c62

  • SSDEEP

    12288:3in6CfHIovueNRvo9EgKvcyuEXbAHLW38a7Lj:RkooHRg9gkEXbAHLyX

Malware Config

Extracted

Family

octo

C2

https://moneymaskalandd.shop/MmExODA3MDAzZjA5/

https://moneycsffhgm7.shop/MmExODA3MDAzZjA5/

https://moneycsasfasfh.com/MmExODA3MDAzZjA5/

https://moneycsasfasfh.net/MmExODA3MDAzZjA5/

https://2moneycsasfasfh.net/MmExODA3MDAzZjA5/

https://2moneycsasfasfh.com/MmExODA3MDAzZjA5/

https://3moneycsasfasfh.com/MmExODA3MDAzZjA5/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Prevents application removal 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to prevent removal.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.fieldeat9
    1⤵
    • Makes use of the framework's Accessibility service
    • Prevents application removal
    • Loads dropped Dex/Jar
    • Makes use of the framework's foreground persistence service
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Acquires the wake lock
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:5071

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.fieldeat9/cache/oat/sogpugsssrhz.cur.prof
    Filesize

    517B

    MD5

    15ddf34f943d9ef09dbf30c9bf253dd9

    SHA1

    5fa43b6e5cce909da5394e2fdfc62edec8815ef0

    SHA256

    430c83043ccdbc76a383b854ebf5e0491c9b63bd660b29f75b36e3794417da07

    SHA512

    9175474ea5fe1f180db805ad2a7c1fcb681c3e1d2d2309ead75b6f7078ce30657dfb87a9c320599e9fa62920d4c03d5d29904144aac429aaca5b78dcb5c1b6f9

  • /data/data/com.fieldeat9/cache/sogpugsssrhz
    Filesize

    449KB

    MD5

    5e410d16990e4790a4fa83a867671120

    SHA1

    0c5845f7680068180c147763e0da1c6afdb64439

    SHA256

    095c112dd4d62a250d1f3bd352e6f69305878cb174c8ab71c892920065ceee91

    SHA512

    1e2146d22667be477a296c7b708f0b03dad43408a34708564e3a3ab44045458d03b86c73c667f83e68d8e51e88651b68aa8e91028aeed9c484835e2945d11919