Analysis
-
max time kernel
179s -
max time network
180s -
platform
android_x64 -
resource
android-33-x64-arm64-20240611.1-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240611.1-enlocale:en-usos:android-13-x64system -
submitted
18-06-2024 22:39
Static task
static1
Behavioral task
behavioral1
Sample
3b6fcda59424915b2da305a84afecd469016ebddf0cde2c6d81d18e89c9eb89c.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
3b6fcda59424915b2da305a84afecd469016ebddf0cde2c6d81d18e89c9eb89c.apk
Resource
android-33-x64-arm64-20240611.1-en
General
-
Target
3b6fcda59424915b2da305a84afecd469016ebddf0cde2c6d81d18e89c9eb89c.apk
-
Size
509KB
-
MD5
b92fd7f9bd4795c661f627e324ed8ab7
-
SHA1
efd03c7406b40426e39462ac8f0f9a220465b6f6
-
SHA256
3b6fcda59424915b2da305a84afecd469016ebddf0cde2c6d81d18e89c9eb89c
-
SHA512
29ff4c97d7e3c56b6e1f88bde3bd9e04f4ab97df4b4b8014101782e84c270820329e5f1cd1afc7c8339eac2627978cabbf7dcd271261f425fbdc45e0050ed1e2
-
SSDEEP
12288:oyGe32CtqGKdSFadA5T3RzjBvvDIzTwZT0f94nsKsnE:D3hqGKdSF2A5TB/BvvDZT0FwsHnE
Malware Config
Extracted
octo
https://biricruelidurdursunn.com/YzRmZmJjZTg1ZmVj/
https://gurcistancruell33.com/YzRmZmJjZTg1ZmVj/
https://cruelveblack32.com/YzRmZmJjZTg1ZmVj/
https://cruelgurcistandaaaa42.com/YzRmZmJjZTg1ZmVj/
https://lalagkcvagurcuuuu.com/YzRmZmJjZTg1ZmVj/
https://biricruelidurdursunloo.com/YzRmZmJjZTg1ZmVj/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
Processes:
resource yara_rule /data/data/com.fewyear48/cache/obwsjayadc family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.fewyear48ioc pid process /data/user/0/com.fewyear48/cache/obwsjayadc 4261 com.fewyear48 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.fewyear48description ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.fewyear48 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.fewyear48 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.fewyear48description ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.fewyear48 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.fewyear48description ioc process Framework service call android.app.IActivityManager.setServiceForeground com.fewyear48 -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.fewyear48ioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fewyear48 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fewyear48 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fewyear48 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fewyear48 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.fewyear48description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.fewyear48 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.fewyear48description ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.fewyear48 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.fewyear48description ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.fewyear48 -
Requests modifying system settings. 1 IoCs
Processes:
com.fewyear48description ioc process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.fewyear48 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.fewyear48description ioc process Framework API call javax.crypto.Cipher.doFinal com.fewyear48
Processes
-
com.fewyear481⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.fewyear48/cache/oat/obwsjayadc.cur.profFilesize
370B
MD5d80d66c724992c6faae77a70a9acb73d
SHA12e943d8cad917088ccf9595ccebe1e47303d26b0
SHA256bf3d75ac24ad6b1d1c21670a77f26650f5fbba745d35a9b311230aa4c06ca4cc
SHA512f925649620843336ebdd92a5b7f656abe27916591ed13a65836f786f1dc1265a4316c6864e510dfae2235937b67359b9c898bf13ca3816c3f283982fe49f794c
-
/data/data/com.fewyear48/cache/obwsjayadcFilesize
448KB
MD57726936dd73fd16ed45cefe88e9c0260
SHA12e0a0679bece4a9ce0b8021573051303e1ea4602
SHA25692c11ce81b987ae90e256331257e8926a8cc0bc596304f05a79c94bccd4436ba
SHA512a055cb33b13e789b397b4ff4616d24e80f11c5241f43bdd02868777d3ed020a1467c0b30517b8b7513fad06f881074ba516e4829e232b3b23a9b88a485e151bb