Analysis
-
max time kernel
149s -
max time network
152s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
05-11-2024 22:16
Behavioral task
behavioral1
Sample
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f.apk
-
Size
3.8MB
-
MD5
0c9cbb06461003b9f41c76c91ab0c0c5
-
SHA1
2d473e68131e62a45cf7db3aa702ac4548592819
-
SHA256
9056ea7d090647e02f1824915a7af8d1ade92aeee246a59f97c409d9f9e1d05f
-
SHA512
cb28fa49e999a62ceaa7b514a90f0470b29142d9f82b960832cae84ede0a7600df84b65dff765af2f1fec0212d1144d44382f93e13d0c18e4deda8a0dc44611b
-
SSDEEP
98304:lMmoZ+NjKHItxtrZE2h5EmDQRaA2+EAGXWXuRN4tAxP:lHL9f7MT3WCEX
Malware Config
Extracted
octo
https://93.123.85.21/ujjwal/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sonnokta Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sonnokta -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.sonnokta -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sonnokta -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sonnokta -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sonnokta android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sonnokta -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sonnokta -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sonnokta -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sonnokta -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.sonnokta -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.sonnokta
Processes
-
com.sonnokta1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5107
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD5b044fed75857077d21ee2bc49a6a048e
SHA1fac99199ef64afc4292db2f08ba760fa245a4dae
SHA2562c41bb67b3ce897714a0ed676e12575a4df2a37c89db4e36104851d8b5d04862
SHA512040650390f81dd117d208582cc43de9f5a80c70a89b74303ed252ce5dd27bbd28d9baa59f10e054951ceaef43b290e5be7e35982b2bfc76746c17627d4937b4b
-
Filesize
71B
MD5c978a96024dcf68c87f3cdc22bc6f45c
SHA10d6e16ae8cf3911aa4a8f4d73623d462317bc78f
SHA25685c32000cac50110131a4231a7b49d6e8c7aa954c9f3eff477189d395e58afde
SHA512cfbd4abe39d13e55016d3d06970910a53e61d434930102190874a0d000110adbe3065fe2d0ea9b0ed99437252f98f2efa3b2249732534c0f98d18340b112b3c6
-
Filesize
88B
MD54d3235b0ac49e4228b1b3886408a6a1f
SHA1b9f780f7cd78de450a790145a13568bb39f25060
SHA2564b9009e885739fa55440869477a88b781d01feea77c020f0c8b82976c45b7c6b
SHA5125daa0d1fc6fd1d2a71dadfac67028267e46b0d9cc7ac2cbd4f9bddee56d70c52ca0a06e434ffbf8c38a58e94d7d7e69a2f41e6f68b3da5f01d228e24b5801c11
-
Filesize
76B
MD55de8ce97646549020aeb116ababacdb5
SHA153204545f09bb69086cbfe70e50508e0af88e8d7
SHA25692aab453866126b77b53ea64ccd3814b0ecdeec824f6a46ea572bf15f5ae499a
SHA51273b743b99734ee27dee7f8766ea5f361de9611f1d5c236e3fb655d2e14f55e531f0c104f877eac83d58dcbc1e23dc3aec4f302fdd8e6dcd0fce614d5fd36cedf