Analysis
-
max time kernel
178s -
max time network
178s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
29-05-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
9080a54e73715519de508607be5198a2563d12b9f044ac858024fea6227373b5.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
9080a54e73715519de508607be5198a2563d12b9f044ac858024fea6227373b5.apk
Resource
android-x64-20240514-en
General
-
Target
9080a54e73715519de508607be5198a2563d12b9f044ac858024fea6227373b5.apk
-
Size
541KB
-
MD5
fe795719d033c398df6dc84b569d1b04
-
SHA1
5ad9ae0e930ae0a08491cfcf23d83ade5286c3c9
-
SHA256
9080a54e73715519de508607be5198a2563d12b9f044ac858024fea6227373b5
-
SHA512
ed6e5fb15bb68cabaa150da4c064cdb36eaff88d5e6c80527519cc72319853dfbd71896cde3fd15773609e49c90da19c83b1dd23ba5af29e09f1e621be2fb4fc
-
SSDEEP
12288:NMYNmfOXNIXUkXGnMEK2ZBUL18oQDmNrtLSqv/Hnx:9N3aE+GnfZk18oQyLLS2Hnx
Malware Config
Extracted
octo
https://moneyeuroland.net/MmI1M2ZiMGRmODEy/
https://moneyeurolandbebek.net/MmI1M2ZiMGRmODEy/
https://moneyeurolandscans.net/MmI1M2ZiMGRmODEy/
https://moneyeurolanddelicim.net/MmI1M2ZiMGRmODEy/
https://moneyeurolandbabis.net/MmI1M2ZiMGRmODEy/
https://moeurolandbabisde.net/MmI1M2ZiMGRmODEy/
https://eyeurolandbabisce.net/MmI1M2ZiMGRmODEy/
https://morolandbabisge.net/MmI1M2ZiMGRmODEy/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
Processes:
resource yara_rule /data/data/com.basesure8/cache/vicqp family_octo -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.basesure8description ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.basesure8 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.basesure8 -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
com.basesure8description ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.basesure8 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.basesure8ioc pid process /data/user/0/com.basesure8/cache/vicqp 5109 com.basesure8 /data/user/0/com.basesure8/cache/vicqp 5109 com.basesure8 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.basesure8description ioc process Framework service call android.app.IActivityManager.setServiceForeground com.basesure8 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.basesure8description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.basesure8 -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.basesure8description ioc process Framework service call android.app.IActivityManager.registerReceiver com.basesure8 -
Acquires the wake lock 1 IoCs
Processes:
com.basesure8description ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.basesure8 -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.basesure8description ioc process Framework API call javax.crypto.Cipher.doFinal com.basesure8
Processes
-
com.basesure81⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Uses Crypto APIs (Might try to encrypt user data)
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.basesure8/cache/oat/vicqp.cur.profFilesize
487B
MD56547ebab665d2c8e1c36981c244d466e
SHA1cd3c21b8f3985fcf7036505b6bb9a7c58ad1391a
SHA256819b49f5a43eea359133c01f4fad9748b830a762b8227f4eeafa0ca6c1c19313
SHA512871c1e15f78e59ea079180a57b279d4595516881131fc245d72d7a76f33296de9df31248214f4a0b311423f2ee32be3996a8b556bef8b40c3212e9dfea742ce4
-
/data/data/com.basesure8/cache/vicqpFilesize
449KB
MD5e403d4ee8e4007469384c292df88152c
SHA18d01dfb3c023526162e8eb43e8dbedab3303b9b9
SHA25630beb2700112ec1b91c0e884a965f5f3e57827a9fe30d684f28c964e34ae5c59
SHA512c85f59f2fdeb57748c343fdcb6fb0b35a78af020764a2905bd2f72ab21d247641922576b68e9705883233040997da67059abea8dc5915a040f3f78c97eda5d60