Analysis
-
max time kernel
149s -
max time network
158s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
10-10-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
84c03fe595a68e77c51d1300ee2d39530bbfc5c44e85354e5b7fa360e094bb02.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
84c03fe595a68e77c51d1300ee2d39530bbfc5c44e85354e5b7fa360e094bb02.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
84c03fe595a68e77c51d1300ee2d39530bbfc5c44e85354e5b7fa360e094bb02.apk
-
Size
1.6MB
-
MD5
620d068d5e6859bf209ffb1f5d23d962
-
SHA1
29d19750fb5c8f04416e06465fdb1a7657c840ee
-
SHA256
84c03fe595a68e77c51d1300ee2d39530bbfc5c44e85354e5b7fa360e094bb02
-
SHA512
f7427ac5e85af0f4e1a338b4f3450411db0f28e18c9da5cdeea056e9e092c4655684e3171a1a0be4d85b28bc2fe165ca7169098c768760410b520c541f2a3ece
-
SSDEEP
49152:usuduEO1Uv7YLfl7278r5Tr4tpAZsD1ctz6tfno3s6:usKcu+U78rphsD1Wz6twh
Malware Config
Extracted
octo
https://teknolojideyeniliklervesontrendler.xyz/YjdkMWRjNTllNzZi/
https://dogalyasamvetatilonerileriniz.xyz/YjdkMWRjNTllNzZi/
https://sanatkulturvesosyalyasantavsiyeleri.xyz/YjdkMWRjNTllNzZi/
https://gezginlerinyenikesifvedeneyimleri.xyz/YjdkMWRjNTllNzZi/
https://oyunvedijitaldunyayakesfet.xyz/YjdkMWRjNTllNzZi/
https://yemektariflerivedogalbeslenme.xyz/YjdkMWRjNTllNzZi/
https://bilimveteknolojiprojelerehberi.xyz/YjdkMWRjNTllNzZi/
https://fotografvesanatcilaryolculugu.xyz/YjdkMWRjNTllNzZi/
https://modavesanatdunyasindakiyenilikler.xyz/YjdkMWRjNTllNzZi/
https://egitimvesosyalgelisimklavuzu.xyz/YjdkMWRjNTllNzZi/
https://yogavesporkocluguprogramlari.xyz/YjdkMWRjNTllNzZi/
https://bilgisayarveoyunseverlertavsiyeleri.xyz/YjdkMWRjNTllNzZi/
https://fotografvegezisoylesileriplatformu.xyz/YjdkMWRjNTllNzZi/
https://yarisvedigitalgelisimprojeleri.xyz/YjdkMWRjNTllNzZi/
https://yenifikirlervegirisimcilikplatformu.xyz/YjdkMWRjNTllNzZi/
https://sosyalmedyayonetimivegirisim.xyz/YjdkMWRjNTllNzZi/
https://sanatvetasarimdunyasiyenilikler.xyz/YjdkMWRjNTllNzZi/
https://bilimvegirisimcilikrotasinda.xyz/YjdkMWRjNTllNzZi/
https://dogadoganlaricinyasamtavsiyeleri.xyz/YjdkMWRjNTllNzZi/
https://gencgirisimcilericevirimdunyasi.xyz/YjdkMWRjNTllNzZi/
Extracted
octo
https://teknolojideyeniliklervesontrendler.xyz/YjdkMWRjNTllNzZi/
https://dogalyasamvetatilonerileriniz.xyz/YjdkMWRjNTllNzZi/
https://sanatkulturvesosyalyasantavsiyeleri.xyz/YjdkMWRjNTllNzZi/
https://gezginlerinyenikesifvedeneyimleri.xyz/YjdkMWRjNTllNzZi/
https://oyunvedijitaldunyayakesfet.xyz/YjdkMWRjNTllNzZi/
https://yemektariflerivedogalbeslenme.xyz/YjdkMWRjNTllNzZi/
https://bilimveteknolojiprojelerehberi.xyz/YjdkMWRjNTllNzZi/
https://fotografvesanatcilaryolculugu.xyz/YjdkMWRjNTllNzZi/
https://modavesanatdunyasindakiyenilikler.xyz/YjdkMWRjNTllNzZi/
https://egitimvesosyalgelisimklavuzu.xyz/YjdkMWRjNTllNzZi/
https://yogavesporkocluguprogramlari.xyz/YjdkMWRjNTllNzZi/
https://bilgisayarveoyunseverlertavsiyeleri.xyz/YjdkMWRjNTllNzZi/
https://fotografvegezisoylesileriplatformu.xyz/YjdkMWRjNTllNzZi/
https://yarisvedigitalgelisimprojeleri.xyz/YjdkMWRjNTllNzZi/
https://yenifikirlervegirisimcilikplatformu.xyz/YjdkMWRjNTllNzZi/
https://sosyalmedyayonetimivegirisim.xyz/YjdkMWRjNTllNzZi/
https://sanatvetasarimdunyasiyenilikler.xyz/YjdkMWRjNTllNzZi/
https://bilimvegirisimcilikrotasinda.xyz/YjdkMWRjNTllNzZi/
https://dogadoganlaricinyasamtavsiyeleri.xyz/YjdkMWRjNTllNzZi/
https://gencgirisimcilericevirimdunyasi.xyz/YjdkMWRjNTllNzZi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4319-0.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mimic.become/app_lumber/noAQj.json 4319 com.mimic.become -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mimic.become Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mimic.become -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mimic.become -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mimic.become -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mimic.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mimic.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mimic.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mimic.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mimic.become -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mimic.become -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.mimic.become -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.mimic.become -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.mimic.become -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mimic.become
Processes
-
com.mimic.become1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4319
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5510ac1840e2ae2b785186552d0da5fd6
SHA17b6a9d88e82ae2d6f6dab2c9a7fe0f243e2c458e
SHA25607b34203987dc7bda605a41afa5b32d26ee3f7e0bcfb6ba720afe9ce5cda897e
SHA51277616691e54fbb87eb6c7cab657d95ddd61fff56574561937fb2f7ba31b9cf3449702d379470e6bbb7e796bdbff02e2a6c6ae2753265cabbea84dd46e32ad685
-
Filesize
153KB
MD5f576e84b0be27e6a9de77deeaabaf7c4
SHA16969b0714408a6e49de594dbe66d0a8bea555075
SHA2569918b3c5cb1d1c8626e9a548fcbf715e8656d80e57a5eac2204a79ef891e47ed
SHA51289d8b0b258ea685a7c65dc17a4c480ca72ca5232fae35bf9f0c87d8dedcc218771d03a749233c1f914378de6ef9028f39eafcfb93457c7913d508e76d926d031
-
Filesize
451KB
MD5438dd55e62d12a43aa013b6a78fed480
SHA158b8b2429b91cb1f632d64494a47ded94c775a37
SHA2568231a89df27cb81c135927d25445e41a961a6e89de0c6f7c81ee11c0a3c58357
SHA51201da8c5449fd896e3cbf82878911419e9a182f21c790589579ba00fbeeedba6c44dedf3d9d867aa6221daef45424ff006e0adaba06cd8eb77c11be5880675587