Analysis
-
max time kernel
148s -
max time network
158s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
04-11-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
ea713f647a0b85740335f342f313e329f849b3cace0bcbfba069c72c4a5b2baf.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ea713f647a0b85740335f342f313e329f849b3cace0bcbfba069c72c4a5b2baf.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ea713f647a0b85740335f342f313e329f849b3cace0bcbfba069c72c4a5b2baf.apk
-
Size
2.0MB
-
MD5
f932bdf41ca7cf4d1efa62f75b25d90b
-
SHA1
bdbc962b76ed7e019b29e1080861f4b2b2d60fa7
-
SHA256
ea713f647a0b85740335f342f313e329f849b3cace0bcbfba069c72c4a5b2baf
-
SHA512
2bc1400c772ae8e303a39d21575878075a9a7850b2b562862427dd3f064e0139425844b185a63855479931f41835458293ffea174aad2da6a65190fd6b14fce2
-
SSDEEP
49152:AEXox/jagsAEq9aWRoq2MTqUsduw6h2vyRvwMbYsS3G:AEYWgMnWX2Me3gn2v2wyXAG
Malware Config
Extracted
octo
https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/
https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/
https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/
https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/
https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/
https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/
https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/
https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/
https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/
https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/
https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/
https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/
https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/
https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/
https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/
https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/
https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/
https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/
https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/
https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/
Extracted
octo
https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/
https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/
https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/
https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/
https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/
https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/
https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/
https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/
https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/
https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/
https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/
https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/
https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/
https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/
https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/
https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/
https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/
https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/
https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/
https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4489-0.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.advance.rent/app_cluster/OAG.json 4489 com.advance.rent -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.advance.rent Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.advance.rent -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.advance.rent -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.advance.rent -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.advance.rent android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.advance.rent android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.advance.rent android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.advance.rent -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.advance.rent -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.advance.rent -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.advance.rent -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.advance.rent -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.advance.rent
Processes
-
com.advance.rent1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4489
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5000317608a6de65dff33ebd8d1649cdb
SHA14e0171ada63fd012e74ab6e59de39938ba578a5a
SHA25697b3adc39c5c5f02f54662f73818f951efb498b5cfaf5ea424648beeda4b4bc7
SHA5129a38f00d592af45cfc60ba145cf8067d79e1a9656e6a549bf54b95396c1f30aa11103008526205d6f23b62a645d158c118cd7b6f222aad476622186df83062d7
-
Filesize
153KB
MD555b34c24cab04135906c36b43ca403b3
SHA10326d2a87e64888147a2bd65e5ec5528e8cfbe65
SHA25629a58a095ae9a8121dc54c3ffc9e42fa0d3859f5585941b827f84ccb69fb8cd5
SHA51294c4c0638e131ea60b3d2877b99c03844271925260172929fb59d41463e7d0faddadd2d173ad24894ae7a60aa7af00d3d029259bb1dfdc3bbbb4b11f787b4015
-
Filesize
451KB
MD599dbb06f3d06627e5dd3b29c1697ecb6
SHA15aa64708963fbe9b5242e082e575213f2dbf7902
SHA25621ff5f087f45eca9e8b7dd2639fb642ba4fff0e05648711053aca5c7c5650bf9
SHA5123c7b49742962b173f9678bdcf550ddf5386e80d6673e05407c3ac0c050c9eecb22fedf7c1972282bda1ca2f70bb8c830e4f1cdfdaae7900f7377c9c82c54f64e