Analysis
-
max time kernel
149s -
max time network
158s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
29-10-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
34bb8a7d5e72a822ab40ac02ef35abddfb5374476bb67d495b5d78614434eb18.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
34bb8a7d5e72a822ab40ac02ef35abddfb5374476bb67d495b5d78614434eb18.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
34bb8a7d5e72a822ab40ac02ef35abddfb5374476bb67d495b5d78614434eb18.apk
-
Size
561KB
-
MD5
a3537562d28e56a918bc42b4a4f68031
-
SHA1
cb8a14341e15e061ae5845f05a3110b5557fd387
-
SHA256
34bb8a7d5e72a822ab40ac02ef35abddfb5374476bb67d495b5d78614434eb18
-
SHA512
a1c8ea2feb4f8725d814e6c02f79d837f85a525ede58893f58f62c8da7eb724efa8dbf377891382d1c9e2c71fb82d125b19089b9ec4571dba032a76481fc1b4f
-
SSDEEP
12288:9RachU/0qMAbFuEBfr/HtSuzJZxV/taK8IXooT8nR345+thpgMCVRsK2:9RachU/qAbFNdHzJLV/1x468Ro5+thpX
Malware Config
Extracted
octo
https://3bb139030bc7238b33981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://6bb1390306788b33981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb139030b74564533981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb1332453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6432453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://43313903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Extracted
octo
https://3bb139030bc7238b33981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://6bb1390306788b33981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb139030b74564533981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb1332453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6432453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://43313903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.letlaughrfxj/cache/kczgt 4328 com.letlaughrfxj -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.letlaughrfxj Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.letlaughrfxj -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.letlaughrfxj -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.letlaughrfxj -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.letlaughrfxj android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.letlaughrfxj -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.letlaughrfxj -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.letlaughrfxj -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.letlaughrfxj -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.letlaughrfxj -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.letlaughrfxj
Processes
-
com.letlaughrfxj1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4328
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
87B
MD5970bd257f42ae02ce8d2b2f83eb0a41c
SHA198ae82e332b7e9efb1b67055ffceba104451689d
SHA2568e0a9644fff5affe8879817b426a989773a5d5ee662406b90a2fd95c40491406
SHA51216fb26ca344d4549efc81af51b13a06e3c52826977d1f38ea9e486910f0d92ddd23a190986510e7a470197d0717fecdd86a683776b62810d37bcdaeb0c65cac0
-
Filesize
449KB
MD55a958967aa2be700775bbc70c931c1b2
SHA1ab29fa5704632d04eecc224b71a541f1c9e122f3
SHA25616b0d9cae4c6eb45e8c033a5431c0eeafd17e0655fd91bcab92780c37fbf547b
SHA512c88a094b308ab10f20de837cfa2475f7be75cafe0e90ea83edbee321bcc99c1c0aeb80e203785377c1fad9535e13e727c9cb23273eb3d4833d0cad3a3a2e6b36
-
Filesize
362B
MD5757f490c74e58162fb5c418bb5705826
SHA110874ddeb5c7d1852ab8a067d3c44e30196066ce
SHA2568654a3b1da8b4cbd6fccbc98da3d873a5ec46bd9b2d242aa1dc055b64ae87f3b
SHA512fe9f8157d429cdfc46c3337a9d28e2f24cf55428861d9dacfd9a21d33a1374a0ad249c3a8111b5edaf654a029baea7216174dd52050cd8813db6abe064075948
-
Filesize
219B
MD545873ea29ada5b37117d53b1475f7043
SHA19296bd1ee1666ddd5e59f63dc2aaf6bdfe40e25c
SHA256933e78874f1b8e0de967c0eb393ebca82d7a06939905a35e3376fff12284e4c9
SHA5123e4729852ded55a1a29599738ca0d7a1968b8ea23748d5e07cdc41650d1894cd035b01d5eea6b1fd07089b7a3070bbc85fe6d8982b7568ad26196de85a475998
-
Filesize
219B
MD5e04212f64d07675587da089c9e572368
SHA19a91fc9ead1a5bc4a27975f7c967d043d67fc027
SHA2568c27150c101cca7249fbdf5af2433f006c1b7072a831beec36a3c60c85749ce6
SHA5120611609c3aac62289839e165b2956c30a38e72ef23fca8a109c16681729c5f7b270a1bd61313f9e1f26a7cedb7732cc0fa8813f36d982670e17d6e2c85e14fe8
-
Filesize
52B
MD541eb1c67743a09d63f64003d7fe8b953
SHA1df5c313160a9475c14223446a0686f38032a86f1
SHA256202809ac92307f7428d4edfbb89c02149e419a4211da03ba0b0c8b1a7ebc4bab
SHA512a4780704b9c7cd28f985b116b560038f0738eaae0bc263307687b721d3665c38d522b7e597a536ef591d3e151847071f4625abb06dc7bdaa98db739ddcea8043
-
Filesize
70B
MD571719f427fa1326e94f93e7ead8b6581
SHA182753893546db387fe95bb64ba9a51660110d491
SHA2563356eed574ac6bb0637ee2fdf8d209b15483afebb28b37b6f520b9174b8d6f6b
SHA51290e198fe0f37afeb1e384f90cdc5f849633c5ad103e4636c4be818364600285f043116fcd73e49940169c0e165ea34e06e5382443b1b9d6c94d939575941f6f0
-
Filesize
69B
MD5f171cf8e244eb36aa47ea38feb7e3210
SHA10c693d4794d9b1345ac137aff5f71630533c5563
SHA2566b31041d56cf1b9a64b09bb5757955ebd93e76c40a4a0d4ef299302094a0f623
SHA5126c2ee297d71349454f726a6c4a054a8ae626b6fb5d87560dacf0978cdbbaa55368353808e01c32abdd16153728b27b321157f91f25826ee71ef863480274fb72