Analysis

  • max time kernel
    56s
  • max time network
    134s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    20-10-2024 22:03

General

  • Target

    cf3c5505e7b7b0846b39efe0b0ae4705423c44692c6b272e5b1f9e8b4c463d48.apk

  • Size

    561KB

  • MD5

    c619ec51d5874f789b4a520313e8ae3b

  • SHA1

    e9e6012a440b2e8f569f133966ec1508f297a532

  • SHA256

    cf3c5505e7b7b0846b39efe0b0ae4705423c44692c6b272e5b1f9e8b4c463d48

  • SHA512

    6162872942ea0a182505aa1e3daf0fb1dbcfdbc0a6db6f3bd79b3dadb2c180a98b010ceaf40f5903f2be59b9eb2441a78e02ff2a448b83ed43550fbed6dde5ee

  • SSDEEP

    12288:z4jGBsO4BnWmkeKvY9zK8PtPkW5Jz9eSC7b3fFh/Bf:z4jGBr4BnWm5KwxK8MW57erbPHN

Malware Config

Extracted

Family

octo

C2

https://2pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://3pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://4pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://5pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://6pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://22pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://32pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://52pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

rc4.plain

Extracted

Family

octo

C2

https://2pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://3pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://4pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://5pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://6pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://22pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://32pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://52pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.scienceinterest5
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4238

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.scienceinterest5/cache/oat/ofbko.cur.prof

    Filesize

    460B

    MD5

    d9c8695c671e01128661c81f90a81175

    SHA1

    b761d7f904b504287b1c2984d8dd0d56d67d45f5

    SHA256

    0103ca25d6064afefa558471a8b8a107946758a399c64255103686b86258fbfd

    SHA512

    07c3d860808c51833096116f012d578b00fa221d39dd2cb0363dedb70377856ecad9a99338af4a89e2d657d4ea0cd4496a51e92a8df2e416f20cbc10bc86328b

  • /data/data/com.scienceinterest5/cache/ofbko

    Filesize

    449KB

    MD5

    6f33065f18732456891348b9f4edbb8f

    SHA1

    32e8ab8d8ee6e5879e4e04882f5f6408b542919e

    SHA256

    cd1aabd07aee5a2c2f50b2bcde1600f54d48893b300228a769017ad403207fba

    SHA512

    6ec9efa8ef647957109fcf9e09a518e53bbd25ff0e689f9c8a986e84fbe20295dff384327c9972b7fedff008b9b2f1ac8f29444b87464bfbf262a618cda550ac