Analysis
-
max time kernel
149s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
05-11-2024 22:16
Behavioral task
behavioral1
Sample
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f.apk
-
Size
3.8MB
-
MD5
0c9cbb06461003b9f41c76c91ab0c0c5
-
SHA1
2d473e68131e62a45cf7db3aa702ac4548592819
-
SHA256
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f
-
SHA512
cb28fa49e999a62ceaa7b514a90f0470b29142d9f82b960832cae84ede0a7600df84b65dff765af2f1fec0212d1144d44382f93e13d0c18e4deda8a0dc44611b
-
SSDEEP
98304:lMmoZ+NjKHItxtrZE2h5EmDQRaA2+EAGXWXuRN4tAxP:lHL9f7MT3WCEX
Malware Config
Extracted
octo
https://93.123.85.21/ujjwal/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
pid Process 4251 com.sonnokta -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sonnokta Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sonnokta -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sonnokta -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sonnokta -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sonnokta android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sonnokta android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sonnokta -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sonnokta -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.sonnokta -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.sonnokta -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sonnokta -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sonnokta -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.sonnokta -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.sonnokta
Processes
-
com.sonnokta1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4251
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD5e601c45ee79650260e9f8f7699728c77
SHA19add07e83e96bad623b2ce21fffe15f08ac8b60f
SHA256e9e48e32e25ccb3e5ae6c90aeb53dbd13577bfbf1cfc5c6b5309ab8345785d50
SHA512ae18761a343ca1841cc2cc07b3b5286d0665c57bea9d77f165f58ed3d690a633aa32ccecaacd81f9f1c80d9e3041f051539c68eab706b892b6c6f730bb7d9fd0
-
Filesize
63B
MD5332f2ca637dbc7e6104892d263d1ca21
SHA1b7fd07f1f24a5fdc1d3f553cbee22551fbcf45f9
SHA2564ad24306ae1ebc6fe99bd382c39dde1a0be577e10e5aaaf2630d77429ac813c1
SHA51243474cc725eaafc465cb225d4cbf3e8ee9e3c927e318735258f08ffec10f66e75b81ef1c83a0ffc1f744fc881a13ceeb5f379c6dcb1e967fed42bf61cbd11f32
-
Filesize
54B
MD57459f2255a8132bff792d4eb67a34b95
SHA13b9b9294ec10f0ea46dc118428a0546dbc3553b9
SHA25685a0a137afd8b3be98ca09fa225e41990108c9923f58aa0dbef45f736d5e8232
SHA512632974d57b124b40987d42c801d24c42ff5a0c78f04f1101125f0cc67276e03654a4bb5f58301bc826ff2cf932778b38efc9bfc77bcaccbca8d7c9e1a2f59327
-
Filesize
437B
MD5c0497930d3a23607b62e7823642c7bce
SHA17861841c240c141e812201ac90f7167239311ffc
SHA2563512eeccc602ebf806780057ab68b998eac1c2cc69257ce39ed05ee142857b22
SHA512c8e3ba5e6e889d7f917d294b41f955f8c0db391e7f5618241cb634fc94093901c62b9fb9b92ed80aabf40322c09ed91c394db9d25985206211bd12fe864b7b2b