Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/08/2024, 07:44 UTC
240806-jkt7watclj 1005/08/2024, 06:12 UTC
240805-gx86fssfmf 605/08/2024, 05:57 UTC
240805-gnvlpsycrj 601/08/2024, 10:08 UTC
240801-l571ksvfrr 6Analysis
-
max time kernel
329s -
max time network
337s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06/08/2024, 07:44 UTC
Static task
static1
Behavioral task
behavioral1
Sample
E-IFADE-VATANDAS.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
E-IFADE-VATANDAS.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
E-IFADE-VATANDAS.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
E-IFADE-VATANDAS.apk
Resource
android-x86-arm-20240624-en
General
-
Target
E-IFADE-VATANDAS.apk
-
Size
1.1MB
-
MD5
bc5dc768e5d005ff2b8e0ecdb84fe048
-
SHA1
cf87b335e4b086f03dfa9e5d8e129844584b7601
-
SHA256
9bf9b54ff34459ea77c1d3c849de9bc557b40c9a13ac9e20254eaf1569ceb05e
-
SHA512
5e23581beb23eafb9690ca58045271dddc68fab72af4b34ec6c41bdfbcab15b04fc0abd9977f93bd7cdcffe5ac606cd9bc9d82b3dcd47d210c7615619746efa9
-
SSDEEP
24576:l6m2oE2rOjocdTq1P5KnU2UdHD9aIWzeNZHhO6G24+fZfjHo2qnO:dE2r9cdTq1PiU5D9aIW6lO6G24+fZLIU
Malware Config
Extracted
octo
https://104.248.139.201/MDAyNTg1MTVhMTA3/
Extracted
octo
https://104.248.139.201/MDAyNTg1MTVhMTA3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.beginhigh19/cache/nhsqwzy 4530 com.beginhigh19 /data/user/0/com.beginhigh19/cache/nhsqwzy 4530 com.beginhigh19 -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.beginhigh19 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.beginhigh19 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.beginhigh19 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.beginhigh19 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.beginhigh19 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.beginhigh19 -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beginhigh19 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beginhigh19 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beginhigh19 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beginhigh19 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beginhigh19 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.beginhigh19 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.beginhigh19 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.beginhigh19 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.beginhigh19 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.beginhigh19 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.beginhigh19
Processes
-
com.beginhigh191⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4530
Network
-
Remote address:1.1.1.1:53Requestandroid.apis.google.comIN AResponseandroid.apis.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A142.250.180.14
-
Remote address:1.1.1.1:53Requestssl.google-analytics.comIN AResponsessl.google-analytics.comIN A142.250.187.200
-
Remote address:1.1.1.1:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.187.228
-
Remote address:1.1.1.1:53Requestwww.google.comIN A
-
Remote address:1.1.1.1:53Requestwww.google.comIN AResponsewww.google.comIN A172.217.16.228
-
Remote address:1.1.1.1:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.200.36
-
1.5kB 40 B 1 1
-
1.5kB 40 B 1 1
-
5.9kB 8.9kB 24 23
-
360 B 6
-
360 B 6
-
1.5kB 6.0kB 11 11
-
360 B 6
-
846 B 40 B 2 1
-
11.1kB 8.8kB 30 37
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
1.4kB 5.4kB 10 11
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
1.4kB 5.4kB 10 11
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
360 B 6
-
1.5kB 5.5kB 12 12
-
768 B 10
-
360 B 6
-
360 B 6
-
135 B 40 B 2 1
-
360 B 6
-
360 B 6
-
360 B 6
-
300 B 5
-
240 B 4
-
240 B 4
-
240 B 4
-
240 B 4
-
240 B 4
-
180 B 3
-
180 B 3
-
120 B 2
-
1.4kB 5.5kB 11 11
-
260 B 5
-
3.7kB 11
-
69 B 109 B 1 1
DNS Request
android.apis.google.com
DNS Response
142.250.180.14
-
70 B 86 B 1 1
DNS Request
ssl.google-analytics.com
DNS Response
142.250.187.200
-
120 B 76 B 2 1
DNS Request
www.google.com
DNS Request
www.google.com
DNS Response
142.250.187.228
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
172.217.16.228
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
142.250.200.36
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD50e61a147862f80d05f98cca723e6121a
SHA1bd2e9c5ad3fb953e2ff2935df27128d9b39b7214
SHA2565fec3818bed5c62b8b417893eef7cf47254e4ec81193e670bb9a601df2850213
SHA512782bd75b66bd229e89e07b939c38ff7e96a423cc957703643a3b761e81f9dd26f52038ed3bb7475663fd77b838a5d53588fc62937111aba4aaaad94800edce20
-
Filesize
479B
MD58ac06d4dac1907468b545511112cadc5
SHA174ac37e4acec5f25b97d8350ef55b06d472f98cb
SHA256795fe89c08d72488a21bf5333a6460db464015c6beec65be649e628705329335
SHA512c8d83baea67f967f99c0e429a0f390d884a732f3102d76188b0653132a7161c1772083c3d918fb82ac90bdd33236178dc4c6fba94bce7c0b61cabaf88239275a
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
230B
MD5245e7300f9091e7ae7b645dd4da05fe9
SHA1ec6f652c8c670193d12c388554279a1038e235f8
SHA25659389d4399cbb350b90c1185f2b7fdf85d9c374bbdf518066e745f801b394ba9
SHA51276617f592f633e6ea2a19eba3627d7261faefacc0df3a09a1a704ef4ed2ee6978d3e8df326427af797063f6e26025cef2b618e94fa23d824bca704f67ebae18d
-
Filesize
64B
MD5d9a00c8376628df73e4338d719c727b9
SHA12edf350d4ca40427c178a19db272497ea3c972a6
SHA2569db32cc09e9a6490b8c9e033d05c301ba83968d3e4cf5548bdcad029616dd023
SHA512e916eeec154b88fc8c3e042f748f940d5556ab06acc574084915aac7c55d526eed5fd79e4b8afd2aa6d15c8f90f45c609ad78560d33493e95c35ed8bce3a205f
-
Filesize
45B
MD534cfa7f6b2f9154b8fe227bf5fac9bba
SHA17ae3af728868a7c403f6afcf83e756e274c9dce3
SHA2564d6a50aeeb3f4dfa6ffb091525e80667d40e88fe362bb2d2834a500dc0e2f1a6
SHA512d1157a2739c2de58f56fd787a4ced3474f1bf2c2f087f13d1569a420ec9ba2bb59fa7e09da8e64b71cd51d58550c00acadd033d0e9d2509144c17345ff64b1c9
-
Filesize
466B
MD5b07a25463ffbba061c360702fc9db80a
SHA16e66cac45433210a4c6fafe4ad787917d1dddb6a
SHA256b39d20beb2f47d404c905377328fb5d473f3fe974ae0dc98d696c79bb619e24f
SHA512096126d3373bfc4926aace159aa17bf1033fc32c8d787039581e403700d08e0e9cca1ea072ea83f4e7a838c70af08a3a6ca178ce2632a6f3807c26dda24b80e0