Malware Analysis Report

2024-07-28 12:11

Sample ID 240612-s7ekdazhmb
Target 0db6cc8437e61e1635b008bfc06cd18d4306775024331aae88e991f6048d8ac2.bin
SHA256 0db6cc8437e61e1635b008bfc06cd18d4306775024331aae88e991f6048d8ac2
Tags
octo banker collection credential_access discovery evasion impact infostealer persistence rat stealth trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0db6cc8437e61e1635b008bfc06cd18d4306775024331aae88e991f6048d8ac2

Threat Level: Known bad

The file 0db6cc8437e61e1635b008bfc06cd18d4306775024331aae88e991f6048d8ac2.bin was found to be: Known bad.

Malicious Activity Summary

octo banker collection credential_access discovery evasion impact infostealer persistence rat stealth trojan

Octo payload

Octo

Removes its main activity from the application launcher

Makes use of the framework's Accessibility service

Queries the phone number (MSISDN for GSM devices)

Loads dropped Dex/Jar

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Declares services with permission to bind to the system

Requests dangerous framework permissions

Makes use of the framework's foreground persistence service

Acquires the wake lock

Reads information about phone network operator.

Requests accessing notifications (often used to intercept notifications before users become aware).

Requests disabling of battery optimizations (often used to enable hiding in the background).

Declares broadcast receivers with permission to handle system events

Performs UI accessibility actions on behalf of the user

Queries the mobile country code (MCC)

Queries the unique device ID (IMEI, MEID, IMSI)

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-12 15:45

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 15:45

Reported

2024-06-12 15:48

Platform

android-x86-arm-20240611.1-en

Max time kernel

169s

Max time network

138s

Command Line

com.keepnorth3

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.keepnorth3/cache/tobpmklxk N/A N/A
N/A /data/user/0/com.keepnorth3/cache/tobpmklxk N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.keepnorth3

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 fesatlarafesatkk.xyz udp
US 1.1.1.1:53 ckinsanaffettmm.top udp
US 1.1.1.1:53 gormedenglenlereslm.xyz udp
US 1.1.1.1:53 gecicekyramatuzatma.top udp
US 1.1.1.1:53 hyatyumrukgibi.top udp
US 1.1.1.1:53 dememelalemnedeerr.top udp
US 1.1.1.1:53 olanlarigoruceez.xyz udp
US 1.1.1.1:53 sankioguncokuzakk.top udp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
US 1.1.1.1:53 birgunolucakelbeet.xyz udp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.204.74:443 semanticlocation-pa.googleapis.com tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
GB 172.217.16.234:443 semanticlocation-pa.googleapis.com tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp

Files

/data/data/com.keepnorth3/cache/tobpmklxk

MD5 ad99d2e463576d713843c4887b9fd92a
SHA1 c76a36c0af80c1705e479be87937508e7d1a64c4
SHA256 9c332c17cb07d2ac2bc37c15a01d78f92ab3dfd1bd39be89578125b0645ea111
SHA512 61a02d0e0d1ecd69134458c5086a38162056268eeaf60fc0396086f3f139c8151503ad4d02fd264a0d8885b3b45f138d821e6ac98e46e0b6e4868014f1bbda21

/data/data/com.keepnorth3/kl.txt

MD5 2ea86599375018abc244017648087564
SHA1 ae5f01206d778308af40c4e01551b4080d5c21b6
SHA256 21a8c58458e9a8e4f727c96b205ea2aefe9ee5d845d799bb736e8dfd8fbdcd61
SHA512 0fdce78e5d1c6d583b698238a8f8a765efe8ea162afea242aaeae4a26e1073d60f9610e6bb1176116d12d107b03f0b5c7f8832f40e1fc4c720b7c2a58d6beca2

/data/data/com.keepnorth3/kl.txt

MD5 5838e753aa4b59580cd2dcd59735c6a5
SHA1 9f08cfeeef07a06d526c10551447e27188cd1068
SHA256 2c9d1008c9ac38e9758d7a510e8802fbbfb167108ae57a2910a10547aa26a9b5
SHA512 d766ea21410e9eb3e1b0b4f32c2175b019cb6cac632a32e47f2b4427d1a1076cf9a378e616ccf72d4424c3bcd05ec17f09d2faecd7f9d337d0e87ec5b96287ef

/data/data/com.keepnorth3/kl.txt

MD5 ebc6abd709210aa1d1e3b59598547c2f
SHA1 8b176ce97ea86e90eccc74e1991a26c8e22e001f
SHA256 cd5ef910acd8d7825c3fd7119b5bc941d273bfd50f1ff8480e26488912e23a72
SHA512 6b0f4bd44d8169b7d237ef3bf119f0eeda616da7ed2fcbec3973a59048cae1e331ea51cab222105b6b2f4a2c4cca8dd3a2c0b2f12c686bd0e0844c7540c744f3

/data/data/com.keepnorth3/kl.txt

MD5 97f682e97da52b0f48f28b5d65ba3339
SHA1 1323a8039302729dc8508d837bfe3efc2728a6a5
SHA256 3f1efa400ea60b8651570f4fee15cf08b77bd05339d011f285534827832adff1
SHA512 a806dbead21e128b4aedb71a8644a398ed5f14a415f17c28cdef29b63f9243a5630307344088ce0f6978a001ea66f233533fffbdc4ac740c1c21bd729dd8f08d

/data/data/com.keepnorth3/kl.txt

MD5 adb1072801a91eb554a4ffcfebb9c71e
SHA1 b5e8bdabd9c779c0820670f3c86ded5c3f81aa3f
SHA256 f87971cf89fbcaa5398ab957cff622c716a842aea04258127b816a3c95537d60
SHA512 01946a39c349e5056531708425e44c641a07ecac3f13329b8ecfe0c0d355bd3b9b65aaedb0e857806ebf45d90b7a8d475b6ab117fe45ac1147a06aea76cfb0a3

/data/data/com.keepnorth3/cache/oat/tobpmklxk.cur.prof

MD5 4ec06e01f29846a96f515683c68b4ccb
SHA1 00d985f60b34a971a7c2e4c37a40bb0a417f9990
SHA256 631d2cac5662ba3e6a49241614ffd486b871b959054039adb1a7347d3a342387
SHA512 2cc79d596af42b7c942b5498e57e1f508fffec49c2dd539387c3d70a20b3beab692ca4d349973be1ee25c5110d347d318fdfe955359a7b6844849425efd9089c

/data/data/com.keepnorth3/.qcom.keepnorth3

MD5 046a414913add6f5bb60072c7db819b6
SHA1 451ee4f6809260aec622d772fd329c7d0297a842
SHA256 b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA512 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-12 15:45

Reported

2024-06-12 15:48

Platform

android-33-x64-arm64-20240611.1-en

Max time kernel

179s

Max time network

187s

Command Line

com.keepnorth3

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.keepnorth3/cache/tobpmklxk N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.keepnorth3

Network

Country Destination Domain Proto
BE 142.251.168.188:5228 tcp
GB 142.250.179.228:443 tcp
N/A 224.0.0.251:5353 udp
GB 172.217.169.68:443 udp
GB 172.217.169.68:443 tcp
GB 142.250.180.10:443 udp
US 1.1.1.1:53 bitmeztukenmezbuenerjj.xyz udp
US 1.1.1.1:53 fesatlarafesatkk.xyz udp
US 1.1.1.1:53 hyatyumrukgibi.top udp
US 1.1.1.1:53 bileneaferinbilmeyeneketamn.xyz udp
US 1.1.1.1:53 taktmkafayikapattmkafayi.xyz udp
US 1.1.1.1:53 taktimbirtipayivedekovayi.top udp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
US 1.1.1.1:53 birgunolucakelbeet.xyz udp
US 1.1.1.1:53 dnliyomsadeceuzaktan.xyz udp
US 1.1.1.1:53 saffetsafmigerckten.top udp
US 1.1.1.1:53 olanlarigoruceez.xyz udp
US 1.1.1.1:53 gormedenglenlereslm.xyz udp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
GB 172.217.169.68:443 udp
US 172.64.41.3:443 udp
US 172.64.41.3:443 tcp
US 172.64.41.3:443 tcp
GB 216.58.201.99:443 tcp
GB 216.58.201.99:443 udp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
GB 142.250.179.228:443 tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp

Files

/data/data/com.keepnorth3/cache/tobpmklxk

MD5 ad99d2e463576d713843c4887b9fd92a
SHA1 c76a36c0af80c1705e479be87937508e7d1a64c4
SHA256 9c332c17cb07d2ac2bc37c15a01d78f92ab3dfd1bd39be89578125b0645ea111
SHA512 61a02d0e0d1ecd69134458c5086a38162056268eeaf60fc0396086f3f139c8151503ad4d02fd264a0d8885b3b45f138d821e6ac98e46e0b6e4868014f1bbda21

/data/data/com.keepnorth3/kl.txt

MD5 4bcfa0a9990f9ed4f06767d1e975f616
SHA1 a498e68976a152e4c0867e0583203989e25f476c
SHA256 250517de705ef5dcb4204246bbc05d60918cfc5dc5ced3832653df49372b478f
SHA512 916bc1480f2238da8f20730c0e3936eb6cab6f48d941781b5921126183b7040d508bc6b1485395089f5624f02259f8c0d74d41215d486c2aba2d67a6a3df0a71

/data/data/com.keepnorth3/kl.txt

MD5 ea0d6654e5cb8aa95ecb6132dbf54d6b
SHA1 f6ecb3f7259a634be993569b4df176390973b4b5
SHA256 06a4e7c45aefa51822e6d450ea0dddfbbc898b5df1376dae08e76dab16587da4
SHA512 e08ea344880e11bc722867badcf9356cab206afc88a2052ad64b7a14f01be24ad5f75f91155990c17e1153a6fccd979c1159a5801b692ef3bd75a0efedf2bec5

/data/data/com.keepnorth3/kl.txt

MD5 a301cd4291ea8df7e1446516d8f8d25c
SHA1 7965d83fbc70a75b3b32436f54c67ca9e2106052
SHA256 45c99c4f18da1ba9a76da2548620beac5691b9bf7179a0a71fd104983959ccc0
SHA512 6f09ec30a1d614e1dbbc972d1bd416241b3d1f015d217b002438de7dc465697cb4bf7d61265bf6f7f416cce014683f648cb7c1f8079552a07f1d5d359be4e202

/data/data/com.keepnorth3/kl.txt

MD5 6f97ba930cf7d4bc2b6fcf211fbb71a2
SHA1 2ececbdba2f9ea0554bbf62e0a09db21ab97ef02
SHA256 62d2cfdf6fb1367956c85c2c4c9d593a9853fba76035dd92fd9c5373ed4e3eaf
SHA512 6a2c1fdbe7f4835aa4b56890903b01a4da6ca563ce320f0408bbd791bd93f7e5d74a5202c4c3e4335f1f9539ac1eaf570878182e0f3266597de4af3be4e28fe3

/data/data/com.keepnorth3/kl.txt

MD5 450f7335d04b8de801662fc318587311
SHA1 7972a7bae3d7f6303d2ba90bbd0d733d77a8959c
SHA256 f96a9cd771f03a54ac3c0f26281dc9f976f6858443cb26769e8ceb0c2d9050bf
SHA512 c4c40511da381aab8256657beda49b9fb2bfec0187d83c0a7dc3fd9677a1bc481148e749ca33fbce7349b283318f28f0e74bb0c1795825b1912b6dbdace2f768

/data/data/com.keepnorth3/cache/oat/tobpmklxk.cur.prof

MD5 38fc384553ee9538e04e567cedd3717e
SHA1 0862951164ffc4aa7204eb1af5e59713d351c7bc
SHA256 79be4a1dda67201856cb557b5576680ec27a3f01f0f2bb0bdd499641190369e0
SHA512 da80e470e6b58834c996ef6dd35f101d61789fa4948137b2bfb27a3fe99c57f61352e79091b3e902dfb1304ff121c9a27019dcd6779687caeb9a742e1c13d35e

/data/data/com.keepnorth3/.qcom.keepnorth3

MD5 046a414913add6f5bb60072c7db819b6
SHA1 451ee4f6809260aec622d772fd329c7d0297a842
SHA256 b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA512 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

/data/data/com.keepnorth3/cache/oat/tobpmklxk.cur.prof

MD5 5feb0b1345fa6bc8fc95a44c67fda99c
SHA1 3721cbc8c8b16b7e16fc996fb7d447ae70345c38
SHA256 3bfba842b6aa55c026508e7a6250e026884ba88be3efd1da999d7293660837b3
SHA512 ea30a880a641b23badbe418d71ecacea0cffcea6c7856df636833d9daae743189b7d6e7fc3e19211370434e9e67ef9bb245609513949f92f8df70a9667e0dd64