Analysis
-
max time kernel
149s -
max time network
153s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
28-10-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
ebf146781a6b0d52c18ff72957eee3f5116c005111716596452654a75fefa11b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ebf146781a6b0d52c18ff72957eee3f5116c005111716596452654a75fefa11b.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ebf146781a6b0d52c18ff72957eee3f5116c005111716596452654a75fefa11b.apk
-
Size
8.0MB
-
MD5
37073a351c8aaa6a4e51db8f18b04f48
-
SHA1
17466f7e8b194777519a3add039d9c3ba9c4deb9
-
SHA256
ebf146781a6b0d52c18ff72957eee3f5116c005111716596452654a75fefa11b
-
SHA512
60397381b6413b16323fd961f9f47f0c9d6235088f03c7d9ee1caae3f7ac06aceaa56e44f842e06a1dd4ab52de050a9592cea1503f1971bfc13c19aa16d6698b
-
SSDEEP
98304:/MX33l7UU3SIdbc5iSRG77RsLOdC3XKVKRTvPkeNeW7:0X33lh3SmcrgR103XKUZv7
Malware Config
Extracted
octo
https://839f702490ce17a92b6e415b949aabc1.com
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4614-1.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.pipservice2_supervision/app_main/XO.json 4614 com.pipservice2_supervision /data/user/0/com.pipservice2_supervision/[email protected] 4614 com.pipservice2_supervision -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.pipservice2_supervision Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.pipservice2_supervision -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.pipservice2_supervision -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.pipservice2_supervision -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.pipservice2_supervision -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.pipservice2_supervision -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.pipservice2_supervision -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.pipservice2_supervision -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.pipservice2_supervision
Processes
-
com.pipservice2_supervision1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4614
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
1008B
MD5db4e203e00a6850232c61493d72dbd60
SHA1f7813f0becaa095bd154e5c37701282c3f5a3e5f
SHA2563dbee94967031a9cc280cc08e1b1ce8227be95c43fe6493a91b9c6f5e49330d1
SHA51243478b3b1a66ef79ffd405867916f3d768c91de5c7fd385b5ee89920620d63b85020938dc1275c232fdfa67bc3283fa5a9cc18dbf5e4aa59393701f801fbaeef
-
Filesize
1008B
MD5b8e9e4bd4a47ef5cb7ceb0f5460f9f4f
SHA14d64cd605824ae566056314b7e549543919af641
SHA256ac1ff088fa976983d400295bf9c72c707585589e93910f3bbb3de559ff6fe0c4
SHA5129e3c7bba854e3063cd88e8b3879586ba0478c6a1d3a77bdc3cc757758e47a9235417cfe91fc083d42a1c5c2afce6e9458f2fd3106259a73ab782d976a19e139e
-
Filesize
322KB
MD577dc50489b9323274732d27dc8a4e803
SHA10e02a3595b62489d0739d771881da8604d117c65
SHA256c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820
SHA5120684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58
-
/data/data/com.pipservice2_supervision/oat/x86_64/[email protected]
Filesize486B
MD58871572bac3a881071998c95055cf9ac
SHA190d964bdb6bf826f09670cbf355891be5490a987
SHA256414ef4a92cb54b91e8ae98717fe4553f5a09608a361eba2fd76cb058245a0e87
SHA512c8c79a48e89e74ccbf7a42fb570a4221a797360b84a23b6192f987788c226b9d806dd3611505e2f94a44002ac40bcb3ab9c4a6184b314cf6789fc5c5e27faa7e
-
/data/user/0/com.pipservice2_supervision/[email protected]
Filesize526KB
MD5418718e98c3e57b9835c7b927c6e4b37
SHA13592d1889f6598192773917169e978ee3d3a1c1b
SHA25671214b59a79e2ff54288b1c80a0b61402e7994e2b1c062ec167f440b72982ceb
SHA5124a31ab871673f29adcafb89eef5a07e98c46c272420d3c9cf77b5f248e8d988182b0dfa7b8b71f5173003e49be4254327c56456c42f1f159b4509e557d4f2c66
-
Filesize
1KB
MD50312ceaa666ba34402881823b57fbd3f
SHA1f04a76cbff6a26c2b5ff9d0be8315f4422bebd67
SHA256b2363280a522e235448db1398901709b8b1c77c65ac136e7006b5287ac3c8b81
SHA512bfe98a74696ab70be9edea1c2b2eaf748de683d1ae7a57d69edd5dfeaf5f312abcbdb4adb3cd921c4058394de7c45267ae65c4e22f82e40e35a9904886339b9b