Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
03/10/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
5188918349077a24492fb57d36fcf5f6f5d9abcf8307bb9229b8d6ffe1d28785.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5188918349077a24492fb57d36fcf5f6f5d9abcf8307bb9229b8d6ffe1d28785.apk
Resource
android-x64-20240910-en
General
-
Target
5188918349077a24492fb57d36fcf5f6f5d9abcf8307bb9229b8d6ffe1d28785.apk
-
Size
2.8MB
-
MD5
ff99715bddf010b33d4a3eef410a3fe7
-
SHA1
81bf41574e1d76732e2fc9f494acfc23ea5baa98
-
SHA256
5188918349077a24492fb57d36fcf5f6f5d9abcf8307bb9229b8d6ffe1d28785
-
SHA512
df52612f45e1ccf7962317693e7ed80fdd28879b1eeb1ce0998a2b7368832c999f7eda1a3766070d2b7306443d3da1270897f5103b8b445c3876f9b1845a24e6
-
SSDEEP
49152:p4toCjw1yIYcdCQXHEr45tQvPBhcu5ZEpdWqusK8EM61cnXaodcqfnUK1dQ3mLiU:CtofRYcd35tMPcubEOqus53YcnXbdnfj
Malware Config
Extracted
octo
https://dijitaldunyayenifikirlervegirisim.xyz/YjdkMWRjNTllNzZi/
https://teknolojininileriyeniliklerrehberi.xyz/YjdkMWRjNTllNzZi/
https://sanatvedogaltasarimlarincografyasi.xyz/YjdkMWRjNTllNzZi/
https://kulturvesanatprojelerindogalteknikler.xyz/YjdkMWRjNTllNzZi/
https://fotografvesanatgozlemlerinesinlen.xyz/YjdkMWRjNTllNzZi/
https://yemektariflerivedogalurunlerkulubu.xyz/YjdkMWRjNTllNzZi/
https://gezginlericinyenirotalarvetavsiyeler.xyz/YjdkMWRjNTllNzZi/
https://sporseverlericinyeniharaketlerrehberi.xyz/YjdkMWRjNTllNzZi/
https://bilimveteknolojionerileridunyasi.xyz/YjdkMWRjNTllNzZi/
https://egitimvegirisimcilikdunyasindan.xyz/YjdkMWRjNTllNzZi/
https://sanatveguncelprojelerplani.xyz/YjdkMWRjNTllNzZi/
https://dijitaloyunvegirisimcilikakademisi.xyz/YjdkMWRjNTllNzZi/
https://dogalhayatvetatilrehberiniz.xyz/YjdkMWRjNTllNzZi/
https://kisiselgelisimvesosyalmedyayonetimi.xyz/YjdkMWRjNTllNzZi/
https://yasamvedogalyontemlerklavuzu.xyz/YjdkMWRjNTllNzZi/
https://kitapvedijitalokumakulubu.xyz/YjdkMWRjNTllNzZi/
https://sinemavetelevizyonprojelerigozlemi.xyz/YjdkMWRjNTllNzZi/
https://oyunvegencgirisimcilergelisim.xyz/YjdkMWRjNTllNzZi/
https://fotografvegundelikgozlemplatformu.xyz/YjdkMWRjNTllNzZi/
https://yeniseyahatvedogalgeziler.xyz/YjdkMWRjNTllNzZi/
Extracted
octo
https://dijitaldunyayenifikirlervegirisim.xyz/YjdkMWRjNTllNzZi/
https://teknolojininileriyeniliklerrehberi.xyz/YjdkMWRjNTllNzZi/
https://sanatvedogaltasarimlarincografyasi.xyz/YjdkMWRjNTllNzZi/
https://kulturvesanatprojelerindogalteknikler.xyz/YjdkMWRjNTllNzZi/
https://fotografvesanatgozlemlerinesinlen.xyz/YjdkMWRjNTllNzZi/
https://yemektariflerivedogalurunlerkulubu.xyz/YjdkMWRjNTllNzZi/
https://gezginlericinyenirotalarvetavsiyeler.xyz/YjdkMWRjNTllNzZi/
https://sporseverlericinyeniharaketlerrehberi.xyz/YjdkMWRjNTllNzZi/
https://bilimveteknolojionerileridunyasi.xyz/YjdkMWRjNTllNzZi/
https://egitimvegirisimcilikdunyasindan.xyz/YjdkMWRjNTllNzZi/
https://sanatveguncelprojelerplani.xyz/YjdkMWRjNTllNzZi/
https://dijitaloyunvegirisimcilikakademisi.xyz/YjdkMWRjNTllNzZi/
https://dogalhayatvetatilrehberiniz.xyz/YjdkMWRjNTllNzZi/
https://kisiselgelisimvesosyalmedyayonetimi.xyz/YjdkMWRjNTllNzZi/
https://yasamvedogalyontemlerklavuzu.xyz/YjdkMWRjNTllNzZi/
https://kitapvedijitalokumakulubu.xyz/YjdkMWRjNTllNzZi/
https://sinemavetelevizyonprojelerigozlemi.xyz/YjdkMWRjNTllNzZi/
https://oyunvegencgirisimcilergelisim.xyz/YjdkMWRjNTllNzZi/
https://fotografvegundelikgozlemplatformu.xyz/YjdkMWRjNTllNzZi/
https://yeniseyahatvedogalgeziler.xyz/YjdkMWRjNTllNzZi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/5068-0.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tuition.record/app_fade/HKTFK.json 5068 com.tuition.record -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tuition.record Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tuition.record -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tuition.record -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tuition.record -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tuition.record android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tuition.record android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tuition.record android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tuition.record -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tuition.record -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.tuition.record -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tuition.record
Processes
-
com.tuition.record1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:5068
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD57f1aa1fb0b39920d77acfbe48f07cefe
SHA165af442325ad26683a5eb619065abf3715871710
SHA256ae3c06a43c4e64d0f9d2f44b88b233174bcf4b61385738845ac9356cd08cdfce
SHA51200df59755d31fe5820f82afe164cbdcc138772f756c675c5592a992d0fa3bdf2feb1cfbc1574b436854a749453f4bf4de89e240ade13f40ebad38cfa89a43fcc
-
Filesize
153KB
MD5dbacb7d891a8c032fbc9af4a3b2635ae
SHA10bea9acf3f27fd76bd1fa5f2abe0907929b3f3c2
SHA2563abfb7aabbd2fd249feb076a9ebbdd7f715d365271a7525a311cd4ec2e536091
SHA512d8fedf437c806b45434e88f9cd805d971f154cc0cc93c2fcb8154f96b5946ecfe86e7d043c19223d35e573497e0aae4e060b4744255e86f2e8b91af8509fa782
-
Filesize
451KB
MD54549c1ce4e57282e169d7330d5360d82
SHA17206a6222ee7439ffb6d09b4616ecd540ce4a2da
SHA25694ca4d24cb6894f986da9b65bc6953035766f3fca4074366645ad770d4886a0c
SHA512c3a276050ab5252397b179b1d2c80e03d04fdcaea7f5153128afd62fd9091a72703b698fea8042f58f2e9a434565db07680282f44eb40ca1ac117153d0f271a7