Analysis
-
max time kernel
54s -
max time network
149s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
29-05-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
9080a54e73715519de508607be5198a2563d12b9f044ac858024fea6227373b5.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
9080a54e73715519de508607be5198a2563d12b9f044ac858024fea6227373b5.apk
Resource
android-x64-20240514-en
General
-
Target
9080a54e73715519de508607be5198a2563d12b9f044ac858024fea6227373b5.apk
-
Size
541KB
-
MD5
fe795719d033c398df6dc84b569d1b04
-
SHA1
5ad9ae0e930ae0a08491cfcf23d83ade5286c3c9
-
SHA256
9080a54e73715519de508607be5198a2563d12b9f044ac858024fea6227373b5
-
SHA512
ed6e5fb15bb68cabaa150da4c064cdb36eaff88d5e6c80527519cc72319853dfbd71896cde3fd15773609e49c90da19c83b1dd23ba5af29e09f1e621be2fb4fc
-
SSDEEP
12288:NMYNmfOXNIXUkXGnMEK2ZBUL18oQDmNrtLSqv/Hnx:9N3aE+GnfZk18oQyLLS2Hnx
Malware Config
Extracted
octo
https://moneyeuroland.net/MmI1M2ZiMGRmODEy/
https://moneyeurolandbebek.net/MmI1M2ZiMGRmODEy/
https://moneyeurolandscans.net/MmI1M2ZiMGRmODEy/
https://moneyeurolanddelicim.net/MmI1M2ZiMGRmODEy/
https://moneyeurolandbabis.net/MmI1M2ZiMGRmODEy/
https://moeurolandbabisde.net/MmI1M2ZiMGRmODEy/
https://eyeurolandbabisce.net/MmI1M2ZiMGRmODEy/
https://morolandbabisge.net/MmI1M2ZiMGRmODEy/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
Processes:
resource yara_rule /data/data/com.basesure8/cache/vicqp family_octo -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.basesure8description ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.basesure8 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.basesure8 -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
com.basesure8description ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.basesure8 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.basesure8description ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.basesure8 -
Requests modifying system settings. 1 IoCs
Processes:
com.basesure8description ioc process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.basesure8 -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.basesure8ioc pid process /data/user/0/com.basesure8/cache/vicqp 4341 com.basesure8 /data/user/0/com.basesure8/cache/vicqp 4341 com.basesure8 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.basesure8description ioc process Framework service call android.app.IActivityManager.setServiceForeground com.basesure8 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.basesure8description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.basesure8 -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.basesure8description ioc process Framework service call android.app.IActivityManager.registerReceiver com.basesure8 -
Acquires the wake lock 1 IoCs
Processes:
com.basesure8description ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.basesure8 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.basesure8description ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.basesure8 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.basesure8description ioc process Framework API call javax.crypto.Cipher.doFinal com.basesure8
Processes
-
com.basesure81⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Removes its main activity from the application launcher
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests modifying system settings.
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.basesure8/cache/oat/vicqp.cur.profFilesize
465B
MD55f7fdb6273a226b2adb7844aa3a47f57
SHA16b85c6b6b046cbcd9e6f6bca078fe78ba3d0f304
SHA256f23e4390e9ccd27b766dbbdee08702ca0b77fe59f827286e85d146dec79e91f8
SHA5125c7e2834eddd12493b45596a26572eb23b81bc4ddf2ef5f73d761eda9063cfb87516bb4e9069b2fe85321c2622fb27aacb549176472afb024398f30cbc8aeb1b
-
/data/data/com.basesure8/cache/vicqpFilesize
449KB
MD5e403d4ee8e4007469384c292df88152c
SHA18d01dfb3c023526162e8eb43e8dbedab3303b9b9
SHA25630beb2700112ec1b91c0e884a965f5f3e57827a9fe30d684f28c964e34ae5c59
SHA512c85f59f2fdeb57748c343fdcb6fb0b35a78af020764a2905bd2f72ab21d247641922576b68e9705883233040997da67059abea8dc5915a040f3f78c97eda5d60