Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    20-10-2024 22:04

General

  • Target

    3097245af13e654937d04f6ce539f2242c67a50f09d5e14beb774ac28a6e7ced.apk

  • Size

    557KB

  • MD5

    75cbe73d1ae3357191da259e67e57bd5

  • SHA1

    29829ebc4f6f74a876ccfdd8c7b85cd7af274e36

  • SHA256

    3097245af13e654937d04f6ce539f2242c67a50f09d5e14beb774ac28a6e7ced

  • SHA512

    a3f4c80b92375152763519caf38d75fa18eb7e9c0a5d91f6479a2d45520e5e4e71bd083130905de6409ba551aff0d6060825a01f1911ef9223e6985986b03a7f

  • SSDEEP

    12288:fkKcDxXlwdjzyq6dgDpwKUWMmWQJVnJx3c4/70g1dSohbF0EutQ:fkKcFX8t+9mW0VnJxMAphF0Et

Malware Config

Extracted

Family

octo

C2

https://2pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://3pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://4pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://5pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://6pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://22pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://32pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://52pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

rc4.plain

Extracted

Family

octo

C2

https://2pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://3pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://4pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://5pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://6pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://22pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://32pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://52pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.sureusual99
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4329

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.sureusual99/cache/oat/pqlslbqtyoz.cur.prof

    Filesize

    466B

    MD5

    7ad32b93d97d6a2a1916870b08ac7f85

    SHA1

    4818e4711c88ec7427881dd3e6f26cbe7af07464

    SHA256

    67b4a44d4057aa760f63c05c44f04036523a4610f28dc5eacd194140e233ecb5

    SHA512

    e5023550c652ad14384ef4567c3e027313b075c2ada4372c8024fcbc3a746ca0229a0896320b24e9d5b9bba62b80c00d49b32b47658e1e2700db22dd2fbe42e6

  • /data/data/com.sureusual99/cache/pqlslbqtyoz

    Filesize

    449KB

    MD5

    68bf892857d47a837ce96665749ee445

    SHA1

    4fce8da81e43247e95313ba330cd421fcb7bf624

    SHA256

    769a9648bab85c6300997d6732bd901f64fc79cc7df9f1920ec9f223bc629218

    SHA512

    2fb66af2fe3c32c5e961c4284cae1a9e02e310653c0b138d276e9a8cd01eb11f22a3b29a32992705977347face1756730e5261ffa7c44ca5b71ab07b7bf68584