Malware Analysis Report

2024-07-28 12:03

Sample ID 240612-sn1nhatdkp
Target adf3836e8dc16d22138c195ea566c8f127b185fe5396a96fabc20fa1d54f05a3.bin
SHA256 adf3836e8dc16d22138c195ea566c8f127b185fe5396a96fabc20fa1d54f05a3
Tags
octo banker collection credential_access discovery evasion impact infostealer persistence rat stealth trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

adf3836e8dc16d22138c195ea566c8f127b185fe5396a96fabc20fa1d54f05a3

Threat Level: Known bad

The file adf3836e8dc16d22138c195ea566c8f127b185fe5396a96fabc20fa1d54f05a3.bin was found to be: Known bad.

Malicious Activity Summary

octo banker collection credential_access discovery evasion impact infostealer persistence rat stealth trojan

Octo payload

Octo

Removes its main activity from the application launcher

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Makes use of the framework's Accessibility service

Loads dropped Dex/Jar

Queries the phone number (MSISDN for GSM devices)

Declares services with permission to bind to the system

Requests disabling of battery optimizations (often used to enable hiding in the background).

Queries the mobile country code (MCC)

Requests dangerous framework permissions

Acquires the wake lock

Queries the unique device ID (IMEI, MEID, IMSI)

Declares broadcast receivers with permission to handle system events

Reads information about phone network operator.

Performs UI accessibility actions on behalf of the user

Makes use of the framework's foreground persistence service

Requests accessing notifications (often used to intercept notifications before users become aware).

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-12 15:17

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 15:17

Reported

2024-06-12 15:20

Platform

android-x86-arm-20240611.1-en

Max time kernel

171s

Max time network

148s

Command Line

com.keepnorth3

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.keepnorth3/cache/tobpmklxk N/A N/A
N/A /data/user/0/com.keepnorth3/cache/tobpmklxk N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.keepnorth3

Network

Country Destination Domain Proto
GB 142.250.178.3:443 tcp
GB 142.250.187.234:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.187.234:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 gormedenglenlereslm.xyz udp
US 1.1.1.1:53 dnliyomsadeceuzaktan.xyz udp
US 1.1.1.1:53 taktimbirtipayivedekovayi.top udp
US 1.1.1.1:53 snayatkatalicam.xyz udp
US 1.1.1.1:53 gecicekyramatuzatma.top udp
US 1.1.1.1:53 saffetsafmigerckten.top udp
US 1.1.1.1:53 birbirbirdenikidir.top udp
US 1.1.1.1:53 birgunolucakelbeet.xyz udp
US 1.1.1.1:53 ckinsanaffettmm.top udp
US 1.1.1.1:53 kirmizimavigelldii.xyz udp
US 1.1.1.1:53 sankioguncokuzakk.top udp
US 1.1.1.1:53 olanlarigoruceez.xyz udp
US 1.1.1.1:53 taktmkafayikapattmkafayi.xyz udp
US 1.1.1.1:53 fesatlarafesatkk.xyz udp
US 1.1.1.1:53 bitmeztukenmezbuenerjj.xyz udp
US 1.1.1.1:53 dememelalemnedeerr.top udp
US 1.1.1.1:53 kfamhepkarambol.top udp
US 1.1.1.1:53 hyatyumrukgibi.top udp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp

Files

/data/data/com.keepnorth3/cache/tobpmklxk

MD5 ad99d2e463576d713843c4887b9fd92a
SHA1 c76a36c0af80c1705e479be87937508e7d1a64c4
SHA256 9c332c17cb07d2ac2bc37c15a01d78f92ab3dfd1bd39be89578125b0645ea111
SHA512 61a02d0e0d1ecd69134458c5086a38162056268eeaf60fc0396086f3f139c8151503ad4d02fd264a0d8885b3b45f138d821e6ac98e46e0b6e4868014f1bbda21

/data/data/com.keepnorth3/kl.txt

MD5 5a72bfc12cff1e006afd81ba38b02d7b
SHA1 d0c6c227cf5fda8dfd7e1f3c412389e894c91bc6
SHA256 83fdbaa4906d90165f1a31ce1ed30ec12460b5969806d7c1898078aa61cb42ef
SHA512 4fe1aa823d04845db77a909b746b4df4e375db4d0bd784585cbf6bffea196ccc4c046e25d76034f572a7d1b4681924d8f34466e50df0328578dea69b0640f006

/data/data/com.keepnorth3/kl.txt

MD5 12d1cdb4431902a35930500087678dad
SHA1 5675e45c335ee81c73bb6a686841f52821c811a3
SHA256 cc3b5467461396695b98eb1b53a3e874d52fce7127ba44809e224c26c06bbb04
SHA512 a361763e44f7bc31a687fd631ea7eae4ccee64adaca51a67c58065d2667ab907ce3618ba0e11f94029948ca5556135517e0a60982f66e7d9c2fa67189af631cd

/data/data/com.keepnorth3/kl.txt

MD5 23b2fa8ab94f1a58f0735f68e28bab77
SHA1 69ea013c5b9e97de35e962fa1d59f1e1e2e3da5a
SHA256 a4f44311d6b0eb89cd9a413e45a035135123ece4ba36f8dd1374ca0a1675382c
SHA512 5c8a7447a3639e5f2e6fd97c647ea3e034a2e06d6abc1139d9bb40e188eaf739c83063ab8575f4e1cdb748d24a6a6353fa3863c0fc5bc6bc9ed3608ea3697460

/data/data/com.keepnorth3/kl.txt

MD5 d92154d9d3d8c7ca36cd0336be0a5aa8
SHA1 49f2db06436e5f0843b3adc0eb2c58819c8a0633
SHA256 65e76cc9e1b7a2e68a34677dc4424158df755f945644edd7576364a2f1ad4707
SHA512 745dc94e020d989abfb6778e4420ab61243b4821431523db2fadba0a81185abbcf5f35a4babcb002e226cc7a009c3b9ad9148488fc3a7a1a3ff83f32ac5a5ab6

/data/data/com.keepnorth3/kl.txt

MD5 dc7230d98267fcb59d2d7c33b7390e20
SHA1 ded9aec8be7c4399200edc8cf0bdf33205ee3a64
SHA256 c20c4846368a0929e94ae4bbf2fa736e9e4eed3c75f666e5162ff6100e4ed8b7
SHA512 0b79587c4fc1460a14ebcc19bccda61d729f18380745107cab4a120f902c93ebe55e83411dc811fbbe420e31f2726a39963a19cb511f68a45f72f989792e7487

/data/data/com.keepnorth3/cache/oat/tobpmklxk.cur.prof

MD5 62538340dec9d731d1a1b9a014adbc0e
SHA1 50369d92b952c6391995a46c4e906ba91f72d728
SHA256 29d5815b62b7a51ec18516cb5d55272f8063b36c5b6f0d54069c99e03409c8f9
SHA512 e90e24041993fcbf7689979919e00402dce44c49e5d0445170de654ee99cf3b08961cca64696884886d3fa2396111d43881e674f72a0f2c682bc05fdc776e436

/data/data/com.keepnorth3/.qcom.keepnorth3

MD5 046a414913add6f5bb60072c7db819b6
SHA1 451ee4f6809260aec622d772fd329c7d0297a842
SHA256 b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA512 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-12 15:17

Reported

2024-06-12 15:20

Platform

android-33-x64-arm64-20240611.1-en

Max time kernel

179s

Max time network

183s

Command Line

com.keepnorth3

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.keepnorth3/cache/tobpmklxk N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.keepnorth3

Network

Country Destination Domain Proto
GB 172.217.169.68:443 udp
GB 172.217.169.68:443 tcp
BE 142.251.168.188:5228 tcp
GB 142.250.179.228:443 tcp
N/A 224.0.0.251:5353 udp
GB 216.58.212.227:443 tcp
US 1.1.1.1:53 bitmeztukenmezbuenerjj.xyz udp
US 1.1.1.1:53 fesatlarafesatkk.xyz udp
US 1.1.1.1:53 hyatyumrukgibi.top udp
US 1.1.1.1:53 dememelalemnedeerr.top udp
US 1.1.1.1:53 birgunolucakelbeet.xyz udp
US 1.1.1.1:53 birbirbirdenikidir.top udp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
GB 172.217.169.68:443 udp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
US 172.64.41.3:443 udp
US 172.64.41.3:443 tcp
US 172.64.41.3:443 tcp
GB 142.250.187.227:443 tcp
GB 142.250.187.227:443 udp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
GB 142.250.179.228:443 tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp
BG 194.59.30.2:443 hyatyumrukgibi.top tcp

Files

/data/data/com.keepnorth3/cache/tobpmklxk

MD5 ad99d2e463576d713843c4887b9fd92a
SHA1 c76a36c0af80c1705e479be87937508e7d1a64c4
SHA256 9c332c17cb07d2ac2bc37c15a01d78f92ab3dfd1bd39be89578125b0645ea111
SHA512 61a02d0e0d1ecd69134458c5086a38162056268eeaf60fc0396086f3f139c8151503ad4d02fd264a0d8885b3b45f138d821e6ac98e46e0b6e4868014f1bbda21

/data/data/com.keepnorth3/kl.txt

MD5 87f12e32f49f92bc4df3a0bb9bff412d
SHA1 eed779a4008feeef322f36cd0b2a120fa649e144
SHA256 fee105eea41e6ccfcf7975367db206ab1fcb113580db8ffb75888f30b45cefed
SHA512 94764d22160d2ba48041381d45ac4b205303aa4def531b093c0fed75a3df0dcf314c3cf5eaa76be730a43fd9de3c48f6f526782f5439915346d86cd73ef847e6

/data/data/com.keepnorth3/kl.txt

MD5 fc8fa50c339804f6f43c0b7d2404fcdf
SHA1 05dd31b0bd0e30fec612ae5dd165ab6cffc6cb8b
SHA256 34514b699ddc69c54d752f480da83e3e1d29343d6a337966a7662b2f0f9701bb
SHA512 57a442c4cfc28de77a39e96a129ab2b66f79a1c62dfb0a740bdd0e8d595337587f5c43a30985cdf0bee1080d114ae9ffddab928f548f7ee61d334a26f8f3144e

/data/data/com.keepnorth3/kl.txt

MD5 20d5ad33b4415dd1cc2c4699077303f2
SHA1 4a433a1a5be4ca5bdaed79f62e9c3bc2973b9591
SHA256 7aded9adfb967d107f17fc9f0cf0acec58195c81ab659ac3395d5a4e71071b62
SHA512 546c2d849a23e43d649e7aadf6e64d75294cd91df8db2420942aa80f6b9aea987b15d5729f54a0a5a83b74a75c538a64b9c2975a4537a989d9061ac361d01796

/data/data/com.keepnorth3/kl.txt

MD5 0b46769b40a03587d207313c80f3e7a3
SHA1 96e1837082382576276d6656de6af600bff8cbd9
SHA256 4601e9de6f857d2d5a4757d67eefa6ee2affc175f5dac85124aa646ec4311be3
SHA512 f82f5f44adb06b1562707c53ae10ec7c18bdde2688a3fefbb6315b5c375b0eedeb5c05a32f79fd1a6b9426b769117432744bb3b6c461c9b791444440562950be

/data/data/com.keepnorth3/kl.txt

MD5 d8a18b939b08fccedce00eb649aaebf6
SHA1 53c521183ce8ead793eab36be626010598c7e240
SHA256 51ab47907f5297a9482cdc4c97a2bbf322bac71b8a25e337e1abc663cf6207ca
SHA512 a7966d954ec2c39c7f6eeac6a8f7a1f560c2b29296a2f214bd35ea1aee4b22c5ae66ce0e26c439396a8c8ffc6b880bb607b1a314dcf92d918af5b8f5162da028

/data/data/com.keepnorth3/cache/oat/tobpmklxk.cur.prof

MD5 0ba457743026f87a41b79e0d791f6f3c
SHA1 78ff217c3c9b6736a0b7fc80b16cdc5202d406da
SHA256 3ffdf751e2d9e36553f8eef758948ebb60da5a2f009029ce346acf57f9b7bf93
SHA512 ee278211bfd436e29ac200de491495ae2e8e4a64130e12366365abc14fc78c4b9ca4bca38907a4aab45adff91dfb342a7e64bf7a8d258cfa084e03c105ca2777

/data/data/com.keepnorth3/.qcom.keepnorth3

MD5 046a414913add6f5bb60072c7db819b6
SHA1 451ee4f6809260aec622d772fd329c7d0297a842
SHA256 b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA512 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

/data/data/com.keepnorth3/cache/oat/tobpmklxk.cur.prof

MD5 624771ee8b4e4dd3254fc584a2e50ad5
SHA1 d44d197c0176b8c731bb3b280b246fa132253b0e
SHA256 86ec4e51fe411c383ad0f39dc0080f5d2fb4a4edebd5bc208cfa1e2a204dbeaa
SHA512 1c6eb61ee32b2941043e075f5c0cddfca4e2928d3053a2736f7027ba5826bd8783aa4a0a0fb3f82df2bfd63e8b0d73be4241bd1e3e8c71e90c281daa34c501dd