Analysis
-
max time kernel
179s -
max time network
185s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
18-06-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
492457b5791ad7d2eeaf104fc0a0b9f5021ef4b362163ee7b310a3f11a790d0c.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
492457b5791ad7d2eeaf104fc0a0b9f5021ef4b362163ee7b310a3f11a790d0c.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
492457b5791ad7d2eeaf104fc0a0b9f5021ef4b362163ee7b310a3f11a790d0c.apk
-
Size
509KB
-
MD5
1fc2dd6d5f8298269f44e3a75aaad661
-
SHA1
37012cfdc361a01375894977dd999783768c93b9
-
SHA256
492457b5791ad7d2eeaf104fc0a0b9f5021ef4b362163ee7b310a3f11a790d0c
-
SHA512
398d5be6d1ef0f2ad7505bd51f998969cd3549136754617df6505cd4d268c0244118abe92b3aa0b3dbda1bf3f6dfdbb10fb8462ebfa42ec8973eee0afdef905b
-
SSDEEP
12288:hsUS5gmTM4X5elQz862+G1djPaZOseHGkKjEN2zwivjGzEvznyJ:eUmXTlX5elQc+uTaZyHGkKwN2PvznyJ
Malware Config
Extracted
octo
https://multipay-3d.website/YjNlM2ZhMjlhNjNi/
https://novediaben52.com/YjNlM2ZhMjlhNjNi/
https://novediayladostadogru3.com/YjNlM2ZhMjlhNjNi/
https://kolaicmiyorumlanben3.com/YjNlM2ZhMjlhNjNi/
https://uyumuyorumlanben2.com/YjNlM2ZhMjlhNjNi/
https://yemekyoksuyok42.com/YjNlM2ZhMjlhNjNi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
Processes:
resource yara_rule /data/data/com.cryplacens/cache/kxaqwvnpfrbmr family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.cryplacensioc pid process /data/user/0/com.cryplacens/cache/kxaqwvnpfrbmr 4266 com.cryplacens /data/user/0/com.cryplacens/cache/kxaqwvnpfrbmr 4266 com.cryplacens -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.cryplacensdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cryplacens Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cryplacens -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.cryplacensdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.cryplacens -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.cryplacensdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.cryplacens -
Performs UI accessibility actions on behalf of the user 1 TTPs 7 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.cryplacensioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cryplacens android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cryplacens android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cryplacens android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cryplacens android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cryplacens android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cryplacens android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cryplacens -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.cryplacensdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.cryplacens -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.cryplacensdescription ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.cryplacens -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.cryplacensdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.cryplacens -
Requests modifying system settings. 1 IoCs
Processes:
com.cryplacensdescription ioc process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.cryplacens -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.cryplacensdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.cryplacens -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.cryplacensdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.cryplacens -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
-
com.cryplacens1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.cryplacens/cache/kxaqwvnpfrbmrFilesize
449KB
MD592b6b49234f7c173766f94372732eeda
SHA1fafe3c96b8f2c5ff16a5296b54d71da4c5750c58
SHA256d53bfb57d10285ea8a7565cec9117d6d266a68f68d20a310c5345153409ec91a
SHA512c67a4976d2120262e12d5fda93f8d2f2c3f5d89849a49524b5bb6fd4a99c51e51debf557757336578ff7b382fc09201fa446ea0078e801b18ba4765b04e4869e
-
/data/data/com.cryplacens/cache/oat/kxaqwvnpfrbmr.cur.profFilesize
525B
MD5f5c7b21c17b339504c1299c85fdc95bb
SHA17fcddfbf2562a6a00e96aa0b5e32828f84d45bdb
SHA25624c368078d9ee5853b05b1821f03d861a61afc38cabd72db4d9bcb934bedd7cb
SHA5120925e356100fe1898b92d7a3f9522a9c14c61a0a2eca399871ea909508943947b65d92d7948354980caa8ef812cc50ff3b5f98be4a1f747f647e788c540c9b2d
-
/data/data/com.cryplacens/kl.txtFilesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
/data/data/com.cryplacens/kl.txtFilesize
63B
MD5e380508e86e5336c5bd405f767445dd7
SHA12aff16646a5b64742a5392280e94957e067a53f6
SHA256957bc894e72327055434742a308c1122d1635fca12b8942dedbd012387a3b47a
SHA512d3785c6ccf2eb801ff4e2c2db282aeeba0219a8a5b11c16fe95d9d36c9a5e2e9f72aefe6e9c63ffcafb6f8c16236e2b3bc2786870dcff34e7e5b6060e551563c
-
/data/data/com.cryplacens/kl.txtFilesize
54B
MD54488591bc4c7894af043bd2617b62a40
SHA14b604ca296846b658a3fb0a11963c7d32359ea48
SHA256050e123c15ba8b9781d73d765cf14be0484e76e6169e6b6e0d9ea0a68dc51579
SHA512c477350507be2bb4f65d7f7379969290040bb7d08fdd77b84719733e7a0bd831d75bf044e879475b6b00102d99f3b2e564744afc532e0c642033aa11707a3711
-
/data/data/com.cryplacens/kl.txtFilesize
63B
MD5f7c981eaa88389b9e44ab6de187c303b
SHA1e294b16e5bd8bfc30894bc85f9e1312b873b354c
SHA2567affdfe0243c7b8b150ae4c99d237d4b282620042d95f41f9d5f9417b3ff2a73
SHA512b2c9dc3f93b1afe68d1539ef3c348c151e1fe29850fbba8461c656337abe6401ab97622e3e78a244ecb96556a8ec9a21e1a7604fd0e769af157ec7b217ba5f7d
-
/data/data/com.cryplacens/kl.txtFilesize
437B
MD5ed37ac62df983010f3c0b02ab2613c28
SHA1d2376a7ed7eed8164132451efdf7a7ec31c021fe
SHA256da3cc47de1e15cc40d1f9c4a8b7c851652cbb1590b60cb220caa4b8a3283dc52
SHA512df7c9d5c0ec852117279eb1ac3e3a7358042471ce39ffbda305ba28269871a58103069b28b68b638ba3f7b00f4b1791faab986f769acd4a4310431088815b7ee