Analysis

  • max time kernel
    51s
  • max time network
    134s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    03-11-2024 22:00

General

  • Target

    672bc6b33db8bc47fdeff28ca6d9ff1e7efe69bb7b6b42ab3286654ea1515e2e.apk

  • Size

    292KB

  • MD5

    96018bf2c6425cf1799d2f87d87d8272

  • SHA1

    4700952ef75d1ce28188ba90651eac2ee4fa1c4c

  • SHA256

    672bc6b33db8bc47fdeff28ca6d9ff1e7efe69bb7b6b42ab3286654ea1515e2e

  • SHA512

    b98b16263f9f21537932b61096d4e93db547515705bd6cad6b380ff4846755c614b44762070d302c8d213d71e7dd1fdaaef9db277b46e951a24861c2774327bd

  • SSDEEP

    6144:P6Rg0ZahNUBrS2qr8PzKVmrRcI1hXXh9MvLHWb0mNgJ7p/EuG/:Ig0IhNyS2qrUJzXXhuDfD7pnu

Malware Config

Extracted

Family

octo

C2

https://flowerpotxq.cfd/YTZhZjliODdlYTI4/

https://tableclothzs.cfd/YTZhZjliODdlYTI4/

https://bookshelfhy.cfd/YTZhZjliODdlYTI4/

https://stardustjf.cfd/YTZhZjliODdlYTI4/

https://heartbreakwy.cfd/YTZhZjliODdlYTI4/

https://nightskypl.cfd/YTZhZjliODdlYTI4/

https://firetruckmz.cfd/YTZhZjliODdlYTI4/

https://icecreamqs.cfd/YTZhZjliODdlYTI4/

https://sunshinevx.cfd/YTZhZjliODdlYTI4/

https://raincoatfg.cfd/YTZhZjliODdlYTI4/

https://shoelacebn.cfd/YTZhZjliODdlYTI4/

https://dreamhousekt.cfd/YTZhZjliODdlYTI4/

https://fishbowlry.cfd/YTZhZjliODdlYTI4/

https://candycanejt.cfd/YTZhZjliODdlYTI4/

https://windstormcz.cfd/YTZhZjliODdlYTI4/

https://snowglobeax.cfd/YTZhZjliODdlYTI4/

https://waterbottleop.cfd/YTZhZjliODdlYTI4/

https://doorbellsv.cfd/YTZhZjliODdlYTI4/

https://grasshopperqw.cfd/YTZhZjliODdlYTI4/

https://phonebookgz.cfd/YTZhZjliODdlYTI4/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.sgakagak.agakagabs
    1⤵
    • Removes its main activity from the application launcher
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4257

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.sgakagak.agakagabs/kl.txt

    Filesize

    230B

    MD5

    b9f52f29d945156a0cab568236ab0b2d

    SHA1

    e82388b32ea2d11f00541b2b56d4fa2ae7ed99f0

    SHA256

    bdceb472d63dfad747a58b18f2202bd1f788cbbf2a6bd3a0458218e4df14d1cc

    SHA512

    3165822f0d03bde9429db7075e7283860ae258e432252895da9046ad29ddf67a60987f6ebb8bd1d03551c38c809b84227dff736a15d89d1b88d4708c8606684a

  • /data/data/com.sgakagak.agakagabs/kl.txt

    Filesize

    54B

    MD5

    5ff2b5e3740f4d86afab046ba89cd01e

    SHA1

    7a0d6686e00b2b8cec3c3d8e5e4793d231e8caea

    SHA256

    fb55e32d8d31257fe9329fff1abe9410ae9b6b04af142908daf5db48eb410755

    SHA512

    724d02c07adbed4c331492534e4e105501de75286e9c64d59b0ac6c1da8033bfa11973c512cbf52283d0b0deea6a14a78d63454a812ca258e8feee5d4cf38f9d

  • /data/data/com.sgakagak.agakagabs/kl.txt

    Filesize

    63B

    MD5

    ad9d72754a5d08fae4a201940bd98a80

    SHA1

    4dbd161642a40d6f85bb386b157387786554b74e

    SHA256

    af274ecd8d03cd58d43854f886e636097c3d1195e4a66199a7ec45fa4be26013

    SHA512

    ee392bcfc7826f97390ce9da78d99b734560f18bd90a5a46698f5e0bf5bcad2979befa640bc2244ec0f0da90077165bdd0798ccf8d2233e8daf71b616bfed480

  • /data/data/com.sgakagak.agakagabs/kl.txt

    Filesize

    68B

    MD5

    bbd5bf556f7a647421aa891f4ca15b00

    SHA1

    92f8b8e15dad2948767da83ae7f81cadb67fbe73

    SHA256

    e501b08420b825d48c67a6fa4d831938a0a4991af3e0790142a8c35b913fea5b

    SHA512

    6ffbfb2de1879135b83450ea50f149f925bded4da917262fc72ffffc6366b52ed15c159cda5b7f32cb8a1475349c258866acb76222ac1ea17c0d8ec355bd9031

  • /data/data/com.sgakagak.agakagabs/kl.txt

    Filesize

    423B

    MD5

    11045a6dadc59c957def94d4aec29968

    SHA1

    3c0cf20511cd7997a36f9544f53506ade732bb79

    SHA256

    68749966a0dac5485418ec2e0d69816820a0adc453b8ed6757b248896f9265a8

    SHA512

    4a78ea6c1e82e3b27c59e9aa8cf2fc41eb554c7b9e621fe1dc41c7aecb0f9702a0f6e668652f6ff4b758314d09a120c1a54563a1a2f9e2288a55e7ea5bc56848