Analysis
-
max time kernel
20s -
max time network
38s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
21/10/2024, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203.apk
-
Size
7.9MB
-
MD5
51f9f4196f87f456a7e246fb9659a486
-
SHA1
721090ca68835f3957552fe4e41335cdf046a74c
-
SHA256
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203
-
SHA512
7934b833adad63329bb3a258553ad1e09baa17f3312a1d9e5905b7c3ab1a5616249d5b88b6dd6bef9a68c65b07dc6daad5cce874d94c1b2f3b10089e4180d00f
-
SSDEEP
98304:Ed2/CHRshfrc3XKVKEW5iSRGax8Czeu6F8HSKXnEWIgnGMiS4rKtGag8dZC:Ew/QRYfw3XKUXrd8keunHXxXnnIKtzK
Malware Config
Extracted
octo
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4515-2.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.jfactory_turbo2/app_dex/classes.dex 4515 com.jfactory_turbo2 /data/user/0/com.jfactory_turbo2/app_dex/classes.dex 4515 com.jfactory_turbo2 /data/user/0/com.jfactory_turbo2/[email protected] 4515 com.jfactory_turbo2 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.jfactory_turbo2 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.jfactory_turbo2 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.jfactory_turbo2 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.jfactory_turbo2 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.jfactory_turbo2 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.jfactory_turbo2 -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.jfactory_turbo2 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.jfactory_turbo2 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.jfactory_turbo2
Processes
-
com.jfactory_turbo21⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4515
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
1KB
MD524e6e7e5ce4dc149ce8c453c9959d62b
SHA1c3951360c12084740920625f8c07723b660a1d3f
SHA256e4d29ffa1511cf13a4dbe7fb380fbb83ee6ebb50efdb059566f2bb48eab15150
SHA51273bfe26d9e22a59617f976303132b9696d99f80e680126ef8c87f94243bc945916fb1eaaa954fd9009c0b95155fd744b91c1d17b46e593d3447c0909b0167107
-
Filesize
1KB
MD541f36fc271c8b472a27f26b89db42b49
SHA1a238e535c61eed5dce55930ac8b713b201129d3f
SHA2562874288c2bad21b759246e79c7c258780168dc3d7a0fad18dd4346c2b93a8e23
SHA512f81537650ec9243cc5bc0db2087cf029e523b30c7eeb57f584c157221539abd8ace3708e16d5040271b76ad00cf750a1c783543504c3bb1461c1f5e60f5af94c
-
Filesize
1KB
MD5dd25b5f1b01a92a156465e68981c1771
SHA1c1c4375be3b3aa87228430e602a065da15855ee3
SHA256e5f40407e6094100bd4e6915d47252f7765983174eee4971ddd4264c02fab9db
SHA512b2a486ba6ab902e29502ceb3b9c4562c191b0815971a49dc4f5e5b762d931339bb355680f87548cb78711e20a7e358391779293eac48963a0e37d028efa8e889
-
Filesize
322KB
MD577dc50489b9323274732d27dc8a4e803
SHA10e02a3595b62489d0739d771881da8604d117c65
SHA256c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820
SHA5120684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58
-
/data/data/com.jfactory_turbo2/oat/x86_64/[email protected]
Filesize985B
MD574d10dca589e5d2717d1514760b12b30
SHA1fe612db88033474065a795d4dbd62fe0f8b31625
SHA256a97de275d0b3dc1e8b9c20f4ff543dce07f00a7f7cc1ec99df249e8f02074c6d
SHA512e032095c2587adb373706c05b7700d7583d39ddfedf28c73c16b46ffccd5e95ef0d090ea7ba94849a9b33ec87a7d9590ae3c5f78f5554b92b9cabceb0cc4f9f0
-
/data/user/0/com.jfactory_turbo2/[email protected]
Filesize525KB
MD514a5f687445a10c28004ecdb15208a22
SHA189965327d07325ff8011aefd17f6a1782667e226
SHA2563263ab77064a9d93635f571d6671611ab89d8955b55dd361d89481f7139d219f
SHA512126457c17a9ba9242a39f54941e37d601ba4fc03a2d47bf30dcd16407d94214e5c4e86bb37a766a0db056258069c2f3a5d8805bcafc7c96984731a08c3f59edf