Analysis
-
max time kernel
27s -
max time network
147s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
02-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
c0b43974e7c5dff72fc566de627dbcb9cdd7691d22f8a00036f60f47f1e0d2e4.apk
Resource
android-x86-arm-20240624-en
General
-
Target
c0b43974e7c5dff72fc566de627dbcb9cdd7691d22f8a00036f60f47f1e0d2e4.apk
-
Size
1.3MB
-
MD5
8d80881e9d68e2c6332073906f11801d
-
SHA1
423e4f9b389cd88f0ad5c2d1cc51cbdf76cf4439
-
SHA256
c0b43974e7c5dff72fc566de627dbcb9cdd7691d22f8a00036f60f47f1e0d2e4
-
SHA512
9132205dfa420109661da932e60a05c2eac1fc9bdf4e31f6a8a3a7c6b2433aa3a30522178f3d6094d2dba388f40fe3803fa95ce3103ee1cbcad386e513b2ebdd
-
SSDEEP
24576:p9L+INfAHMhj1WwUm/JuSESbQiShBf/GSpWwyHTTZfLFZZMlp7sF5mi2Wi:p9LBnhj0a/3QiA5/GSpWbTTZDF4p7Yg
Malware Config
Extracted
octo
https://3bb139030bc7238b33981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://6bb1390306788b33981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb139030b74564533981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb1332453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6432453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://43313903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Extracted
octo
https://3bb139030bc7238b33981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://6bb1390306788b33981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb139030b74564533981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb1332453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6432453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://43313903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://9bb1332453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://5bb1332453233981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-11.dat family_octo -
pid Process 4214 com.piececover6 -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.piececover6/code_cache/secondary-dexes/base.apk.classes2.zip 4242 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.piececover6/code_cache/secondary-dexes/base.apk.classes2.zip --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.piececover6/code_cache/secondary-dexes/oat/x86/base.apk.classes2.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.piececover6/code_cache/secondary-dexes/base.apk.classes2.zip 4214 com.piececover6 /data/user/0/com.piececover6/cache/wbkluozhdyk 4214 com.piececover6 /data/user/0/com.piececover6/cache/wbkluozhdyk 4214 com.piececover6 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.piececover6 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.piececover6 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.piececover6 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.piececover6 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.piececover6 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.piececover6 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.piececover6 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.piececover6 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.piececover6
Processes
-
com.piececover61⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4214 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.piececover6/code_cache/secondary-dexes/base.apk.classes2.zip --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.piececover6/code_cache/secondary-dexes/oat/x86/base.apk.classes2.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4242
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54e61c08811afeb9494278f1a7d47f738
SHA15b2a983ae31618ed7f9a4bbbd5822aa97ca756d9
SHA2563e6a57ba3a7efa0887a27b60ba09df2a0bfc892b1741baeb41c832f9113d0256
SHA5128fe9363a05b119854504f6eb8a184a34111eb19eb6dc57846da6c02dc6cc56ff9aa60b443b9321f237404455813dc8a2f9401b9d6b7954b745669990d0a4b042
-
Filesize
1KB
MD5c7b5eada3dc95bb00d702d4dc3650e8f
SHA144040978491dd8614755c95677b23f16526d72bb
SHA256cf3620fca474b5e8073608f3c75824ba0c60bf419b716f943fcf58b2247be25d
SHA5124c4ac0db8075b91736b301dcfacc334abcb449a0e3178d5203e4f434518a5ade405a5faa79bd5ff537e0c350d82ac449be5e273ea63aa4b03e45efdb7a16186f
-
Filesize
449KB
MD56815620d7515427c5fa4735f11281c2b
SHA1089b66fb5ac0ecfeb34384e6c1a793cdef843df3
SHA2563cbfba98f094f17175803e9874a7c5170c4c58b7cf75e6f858a1a31548b2a309
SHA51206927ffd3e726819a21a2258977eaff3f198327634882eb2a99d114d878e1f68d82ab1e695a81d09ea78ed62880a1fa4098dd141dd93a6637117aa9ff279718b
-
Filesize
2KB
MD5b073f960fbda11986db8fee0815fb86b
SHA15be979257ba8d218d2851571efe0121c81b98a62
SHA256016737518c8f4d1a5f90cc61945b21b499b4086dc9ae616502dbfc918a6fa636
SHA512eb09d0084d56d68fcc5c147816c618959a3ea278ef477f9c5a8777f86cfd7381928206394042d3edaa5753f9c513bf106d29b77eba809eb570b7cfe230b4645c
-
Filesize
1KB
MD5a7d1a53be7de6ee121bf298f40d2c1b9
SHA1806580d2cb6baa022e7bf65ab5cb233fa0809c9e
SHA256174afa2d05482af1f86ff87a7c398c814e16f9310325feb046ff51fbd69e6bbf
SHA512f15cd3a05d2b364dd8d7e70f0d9c429fdb7eb4ca8129f06f90d71c86791392e553c66d0bbee9e96187d56637e6e5c636cb3e7d5cf538bf624e9c0ed1841a11ae
-
Filesize
2KB
MD5eca456d2b1a0447b182203f4fea2a362
SHA116e1eb29da13b8f3fbd45bfe04eada3e23287d8a
SHA2567c2b035f5ebeee4a73a7f7a5f27bdc854b2454221ddb507cea6a5e23eda5da8b
SHA512d73aac55bf2d266d990fb0427cd477c38dddfe14c74e0a183404fe5823c3dcb73b5c72c922692791f834051bb9758c4377d39aaa639d7a1790c4d099f8e15d2e