Malware Analysis Report

2024-07-28 11:40

Sample ID 240624-wmzllaycqr
Target 927593434fcecf77f1da09423339c32181415d73b8d1716f3d75d7f000cfc065.bin
SHA256 927593434fcecf77f1da09423339c32181415d73b8d1716f3d75d7f000cfc065
Tags
octo banker collection credential_access discovery evasion impact infostealer persistence rat stealth trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

927593434fcecf77f1da09423339c32181415d73b8d1716f3d75d7f000cfc065

Threat Level: Known bad

The file 927593434fcecf77f1da09423339c32181415d73b8d1716f3d75d7f000cfc065.bin was found to be: Known bad.

Malicious Activity Summary

octo banker collection credential_access discovery evasion impact infostealer persistence rat stealth trojan

Octo payload

Octo

Removes its main activity from the application launcher

Loads dropped Dex/Jar

Makes use of the framework's Accessibility service

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries the phone number (MSISDN for GSM devices)

Requests dangerous framework permissions

Performs UI accessibility actions on behalf of the user

Queries the mobile country code (MCC)

Queries the unique device ID (IMEI, MEID, IMSI)

Requests accessing notifications (often used to intercept notifications before users become aware).

Declares broadcast receivers with permission to handle system events

Makes use of the framework's foreground persistence service

Declares services with permission to bind to the system

Acquires the wake lock

Requests disabling of battery optimizations (often used to enable hiding in the background).

Reads information about phone network operator.

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-24 18:03

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-24 18:03

Reported

2024-06-24 18:07

Platform

android-x86-arm-20240624-en

Max time kernel

178s

Max time network

137s

Command Line

com.whiletable82

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.whiletable82/cache/enumcmbe N/A N/A
N/A /data/user/0/com.whiletable82/cache/enumcmbe N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.whiletable82

Network

Country Destination Domain Proto
GB 142.250.180.10:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 uzanrmigokyuzuneumutlarm.xyz udp
US 1.1.1.1:53 amagibikertenkeellee.top udp
US 1.1.1.1:53 ustuneyagdimrmi.xyz udp
US 1.1.1.1:53 sokakdaldiregibas.xyz udp
US 1.1.1.1:53 chennemburasialmnya.xyz udp
US 1.1.1.1:53 sefernakliatfln.xyz udp
US 1.1.1.1:53 giydirbilirfren.xyz udp
US 1.1.1.1:53 verelmsnieldenele.xyz udp
US 1.1.1.1:53 birdnbireoluvrdihrsy.xyz udp
US 1.1.1.1:53 dardidardomama.top udp
US 1.1.1.1:53 keskinbaltadndu.top udp
US 1.1.1.1:53 zatenacikmisttm.xyz udp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
GB 172.217.169.10:443 semanticlocation-pa.googleapis.com tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp

Files

/data/data/com.whiletable82/cache/enumcmbe

MD5 163a1af175dcc6e79465a14948f0d2af
SHA1 160806021edf038e47f8db0bce96fe6b6cf4135f
SHA256 14e8289b6f8fcbe293a1a645ee5bbcf566543b06310aae5b6875686e997995b7
SHA512 7259335aab5bf353e8722a793d1e20c3f847b20355acf77a0c076c0eafe88d494d9878a027f29481a16f60eae11f0609732dd258c0e2b2d07bffd8b694fe5a57

/data/data/com.whiletable82/kl.txt

MD5 b1666da277bb84659c5871ce32c3551e
SHA1 f543ffa86fd75baa432220c2e519bba28ffda669
SHA256 806850f3106dafe39b66502aa27f2de9a5a8a761b7866ed1c726b2e89a80e72f
SHA512 20d2175242e0f49aaf2d358ed4f30af03be2bb9902af99cce11614e7b2da4f6e84b43ae1104fac16dc4fb1f268260ce07dcdd5d44c68c4955d607ac1941dd0bf

/data/data/com.whiletable82/kl.txt

MD5 8e5522eb2e8966c33ec180fd9bf51b07
SHA1 3fcecd4d67d11a33aae861a6f0151a545fbf68c9
SHA256 b1ed70ab3b4ad97024f8ef7db787c94f62b08bca9eb5f264cdffbb29320cdc57
SHA512 c7bada8a4189938a6e34baa613c5225698aa9d67082b850de73bc312757fcceea9389af7d2bd298536a7920972efa513e67b11af67b63293525cef0347c5db81

/data/data/com.whiletable82/kl.txt

MD5 1b2635de4d803fa22046cefdb2ffac9d
SHA1 2722a6700a06444c0120806def4c9df33c25728c
SHA256 de19d8c63eb48649cfe58d5c64f0f6fcb9b34f1577d9b2d38fcaa432c294b5f7
SHA512 15a5d3de11d198e1bf9b924fe9519f34ecb416db2e26e67126b461af31ea1b70a8911489728aaba7e0e3bb84e7dbbd821bd18c958f7e9540a2171cdd3670ca9f

/data/data/com.whiletable82/kl.txt

MD5 45a238be5635ffc6a6405752fb65522a
SHA1 59fc021be7dc7ca01cbede15ada3e613d2872338
SHA256 45c74a74d52e9f87a1e4dbfb0b44aa6e05e1a4999becf83ac7f6fc4925eac3d6
SHA512 2c9d4a2495c9e6c105fbf95f20c7634005f21eaac03122253285c8a078c3b1f4679502c66026ce297af85054e0597ee32c92d77d5fc24fd89809db225ddc124a

/data/data/com.whiletable82/kl.txt

MD5 a6398f714359f64d61dd34f79b5a6b6e
SHA1 66e5e1822304e44774763c89a1c738bc067a840c
SHA256 368438a455251a0554384520e7eaed183df8a8547d71590301a80163e5586bf0
SHA512 51693977756f2c44184642e6f439ea8ca6bb09df6d75c0cafbeb14bf10e70a127f3ac346cfc0b52793805b1f64f4fec11c7cb022c4f5a919681b1e9e60b781cf

/data/data/com.whiletable82/cache/oat/enumcmbe.cur.prof

MD5 b9d818953bdf26f94ab9e2a2b38dec42
SHA1 e595bc3733691f04077b1027b006a5be1ab38498
SHA256 a36ec4239f19b611f2f2451384d7866b8df6e23911737e70620bb102b496004c
SHA512 2713e84c9a9d7072e41611fd1cb7219994c85d006914f4468b5a9aa1b37f118393db41434e8db161e042c6a051f9cc9b222eff952aea11bbd0ef8440021fae58

/data/data/com.whiletable82/.qcom.whiletable82

MD5 046a414913add6f5bb60072c7db819b6
SHA1 451ee4f6809260aec622d772fd329c7d0297a842
SHA256 b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA512 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-24 18:03

Reported

2024-06-24 18:08

Platform

android-x64-arm64-20240624-en

Max time kernel

179s

Max time network

168s

Command Line

com.whiletable82

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.whiletable82/cache/enumcmbe N/A N/A
N/A /data/user/0/com.whiletable82/cache/enumcmbe N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.whiletable82

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ustuneyagdimrmi.xyz udp
US 1.1.1.1:53 keskinbaltadndu.top udp
US 1.1.1.1:53 kraltacikralmisinhaci.xyz udp
US 1.1.1.1:53 amagibikertenkeellee.top udp
US 1.1.1.1:53 avmevsimibsladikk.top udp
US 1.1.1.1:53 gozlermkankrmizisi.xyz udp
US 1.1.1.1:53 senanlamazsndili.xyz udp
US 1.1.1.1:53 birdnbireoluvrdihrsy.xyz udp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.178.8:443 ssl.google-analytics.com tcp
GB 142.250.187.206:443 tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
GB 142.250.187.227:443 tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp
BG 194.59.30.2:443 amagibikertenkeellee.top tcp

Files

/data/data/com.whiletable82/cache/enumcmbe

MD5 163a1af175dcc6e79465a14948f0d2af
SHA1 160806021edf038e47f8db0bce96fe6b6cf4135f
SHA256 14e8289b6f8fcbe293a1a645ee5bbcf566543b06310aae5b6875686e997995b7
SHA512 7259335aab5bf353e8722a793d1e20c3f847b20355acf77a0c076c0eafe88d494d9878a027f29481a16f60eae11f0609732dd258c0e2b2d07bffd8b694fe5a57

/data/data/com.whiletable82/kl.txt

MD5 19a6e16ba8f85d302fddc696af51bad7
SHA1 9758b0ebefb2b635f7d7579ded23628da193ff98
SHA256 059ee276ea6673c4ebcdb7a17a5007298c0c16c8a372e41306ca7981153ad92a
SHA512 610fc91a45d74e096f423169c6862a79c3d6a865e75563d8d02f871258d1157e2ac52b936bf1ce963dbb905334f3e160acf349994bd425ab172495e7921d8aba

/data/data/com.whiletable82/kl.txt

MD5 777165b736c52f0c2ab7f4a40eb1717c
SHA1 3329d51ac5fdd4f8b09d546acc8168f9a89c6302
SHA256 8930dd3dfef180c9efdd0f35bac52863230847c69d8ffe7f8a6fe2e612ed2677
SHA512 4778526beface9612845c72475955acc74bc60a73f55939339a20f6e1e5aa02832f6b031de7e26e854ae70de61b8638696a3786d9ad634bd98c14c3aa142d2c3

/data/data/com.whiletable82/kl.txt

MD5 8880b227c34a4bb0a516789ed6bba867
SHA1 a767d9958ac9043382786ac62285cc69d7551872
SHA256 3c0194ca82c43b3f412eeda67110776ae85d06b741688b5ed6edafaec26fd863
SHA512 547a1f2bb726e09f9ae2e391bf5e185afe685a23d85168e5703bcecd1d0a7a4b5a5d7283e0a0c2259d1b0484e14479af04cfb5b22fbf30dcc3e7baaaeb23be8c

/data/data/com.whiletable82/kl.txt

MD5 7d700c21da1dd163a2033d36357aa8c8
SHA1 3c39d985272906b108d178ea62368b84e768863e
SHA256 32f64b3e7bf2304241311a0877083ad9c83d4cbbea2e41b1fded123b395b819c
SHA512 55f2f873ca80fce19e166717d6f5649707cef69120d482b394c1cf3dc8aeb442864f5116c240564e5242ebc1eeb1fc134a68212b443233f8bf70ffb5a2c922cd

/data/data/com.whiletable82/kl.txt

MD5 0a7c0c2b511493fad7202dfec587451f
SHA1 c821e34a59d39605e3fa9f66e7b3360401db9a18
SHA256 6332b3e3651ef8890e485a41966d7da067da53c52e6cf1cb05d56d5fa7a11704
SHA512 5f4e0fe6d2ed6362016afab3d7b278196db7875705cbe594c028d30f0121d085da4b979410c0bf2a762f1024dd04816e6a75f84e23056beb8aa931112f76ea48

/data/data/com.whiletable82/cache/oat/enumcmbe.cur.prof

MD5 8edee7a78414671a3508e157aab0e2e9
SHA1 1c95c47a8b020c24b7c268455544f62da89cb7b9
SHA256 e7b85207dbe9262cbb9fb39801d6d93b581d0d6997eebc15b5d7f2e8e51db729
SHA512 2e00a12a221d723fe10c0786cab7186284d49a77a6b62298797f51da7e0120b1be824b844cc04c2939de238edbae980f867903ebdae959d42a8dedb557b9ad1b

/data/data/com.whiletable82/.qcom.whiletable82

MD5 046a414913add6f5bb60072c7db819b6
SHA1 451ee4f6809260aec622d772fd329c7d0297a842
SHA256 b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA512 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c