Analysis Overview
SHA256
8c4d9f3f47768e3ea799c3681cf0df7d9725e082f2f54ef74ad00270ab9bc692
Threat Level: Known bad
The file 8c4d9f3f47768e3ea799c3681cf0df7d9725e082f2f54ef74ad00270ab9bc692.bin was found to be: Known bad.
Malicious Activity Summary
Octo payload
Octo family
Octo
Makes use of the framework's Accessibility service
Obtains sensitive information copied to the device clipboard
Queries the phone number (MSISDN for GSM devices)
Loads dropped Dex/Jar
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Acquires the wake lock
Reads information about phone network operator.
Declares broadcast receivers with permission to handle system events
Declares services with permission to bind to the system
Makes use of the framework's foreground persistence service
Requests dangerous framework permissions
Queries the unique device ID (IMEI, MEID, IMSI)
Queries the mobile country code (MCC)
Registers a broadcast receiver at runtime (usually for listening for system events)
Uses Crypto APIs (Might try to encrypt user data)
Checks memory information
Checks CPU information
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-11-07 22:08
Signatures
Declares broadcast receivers with permission to handle system events
| Description | Indicator | Process | Target |
| Required by device admin receivers to bind with the system. Allows apps to manage device administration features. | android.permission.BIND_DEVICE_ADMIN | N/A | N/A |
Declares services with permission to bind to the system
| Description | Indicator | Process | Target |
| Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. | android.permission.BIND_NOTIFICATION_LISTENER_SERVICE | N/A | N/A |
| Required by accessibility services to bind with the system. Allows apps to access accessibility features. | android.permission.BIND_ACCESSIBILITY_SERVICE | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows an application to monitor incoming MMS messages. | android.permission.RECEIVE_MMS | N/A | N/A |
| Allows an application to read or write the system settings. | android.permission.WRITE_SETTINGS | N/A | N/A |
| Allows read access to the device's phone number(s). | android.permission.READ_PHONE_NUMBERS | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an app to post notifications. | android.permission.POST_NOTIFICATIONS | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-07 22:08
Reported
2024-11-07 22:10
Platform
android-x86-arm-20240910-en
Max time kernel
144s
Max time network
151s
Command Line
Signatures
Octo
Octo family
Octo payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped Dex/Jar
| Description | Indicator | Process | Target |
| N/A | Anonymous-DexFile@0xd04f8000-0xd057b9c4 | N/A | N/A |
Makes use of the framework's Accessibility service
| Description | Indicator | Process | Target |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId | N/A | N/A |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId | N/A | N/A |
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries the phone number (MSISDN for GSM devices)
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Queries the unique device ID (IMEI, MEID, IMSI)
Reads information about phone network operator.
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Uses Crypto APIs (Might try to encrypt user data)
| Description | Indicator | Process | Target |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.emulation_products69
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | a9511a5f4723aea76c429bb7bbba6738.icu | udp |
| US | 1.1.1.1:53 | 09de95750d3056113a82c32fb0d99ac3.org | udp |
| US | 1.1.1.1:53 | af1004be15890e79d850aa6a85010c8f.com | udp |
| US | 1.1.1.1:53 | f39aab2c7026a6b7c52f754a5e785fb5.shop | udp |
| US | 1.1.1.1:53 | da3f6b1119d9b2ab9f84b23329bfbeff.info | udp |
| US | 1.1.1.1:53 | 99b514371334ced2c82f709ee85f6f20.website | udp |
| US | 1.1.1.1:53 | 2bdfa2e03fbe1da80c4c1ea70e557eb5.online | udp |
| US | 1.1.1.1:53 | 743cd7b78164e8822581fc40a3aaa46e.store | udp |
| US | 1.1.1.1:53 | 5209d11dadacec4c9b36e62f6ca9a287.site | udp |
| GB | 216.58.201.110:443 | tcp | |
| GB | 216.58.201.110:443 | tcp | |
| GB | 216.58.201.110:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.200.14:443 | android.apis.google.com | tcp |
| GB | 142.250.187.196:443 | tcp |
Files
/data/data/com.emulation_products69/files/.u
| MD5 | 4e73947cabb5db3f92ca85004981b754 |
| SHA1 | 6d9667fdb0280ed2dcb782b4683e422a51bdc601 |
| SHA256 | 6db94232e756b90ed437f1bc87dc38cf20fb2e7c7a19a5e40c6c17254b7e234c |
| SHA512 | be8b500a7070af1dfb53b0cf1a7b327dadc4e163a6dad905496ac228c58cd1ed87b054533917924455d35e9b300683ae33e1bcdd91935a5dbae1d693c3e13d69 |
Anonymous-DexFile@0xd04f8000-0xd057b9c4
| MD5 | 77dd1081a1bc13abf45e7cec8e367a2c |
| SHA1 | 70686eb87d437f3384fe38fb8f701852b5065478 |
| SHA256 | 672b475bdfa3041f1fe0a7613f6c7b21ab7b16e99aa250019a2197201b2f6741 |
| SHA512 | ae6711a2e69cb26b0729f7ea8718909122a228f13d7cdba9ff218b156d20d0224eeb02ce7847de7c810a1a8fce16d4f1d8c493a0c30673a9b36882de638b6c9a |
/data/data/com.emulation_products69/.global.com.emulation_products69
| MD5 | 046a414913add6f5bb60072c7db819b6 |
| SHA1 | 451ee4f6809260aec622d772fd329c7d0297a842 |
| SHA256 | b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a |
| SHA512 | 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-07 22:08
Reported
2024-11-07 22:10
Platform
android-x64-arm64-20240624-en
Max time kernel
140s
Max time network
151s
Command Line
Signatures
Octo
Octo family
Octo payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped Dex/Jar
| Description | Indicator | Process | Target |
| N/A | /data/user/0/com.emulation_products69/[email protected] | N/A | N/A |
Makes use of the framework's Accessibility service
| Description | Indicator | Process | Target |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId | N/A | N/A |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId | N/A | N/A |
Obtains sensitive information copied to the device clipboard
| Description | Indicator | Process | Target |
| Framework service call | android.content.IClipboard.addPrimaryClipChangedListener | N/A | N/A |
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Queries the phone number (MSISDN for GSM devices)
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Reads information about phone network operator.
Uses Crypto APIs (Might try to encrypt user data)
| Description | Indicator | Process | Target |
| Framework API call | javax.crypto.Cipher.doFinal | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.emulation_products69
Network
| Country | Destination | Domain | Proto |
| GB | 142.250.187.238:443 | tcp | |
| GB | 142.250.187.238:443 | tcp | |
| GB | 142.250.187.238:443 | tcp | |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.187.238:443 | tcp | |
| GB | 142.250.200.36:443 | tcp | |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 142.250.187.228:443 | www.google.com | tcp |
| US | 1.1.1.1:53 | a9511a5f4723aea76c429bb7bbba6738.icu | udp |
| US | 1.1.1.1:53 | 5209d11dadacec4c9b36e62f6ca9a287.site | udp |
| US | 1.1.1.1:53 | da3f6b1119d9b2ab9f84b23329bfbeff.info | udp |
| US | 1.1.1.1:53 | 743cd7b78164e8822581fc40a3aaa46e.store | udp |
| US | 1.1.1.1:53 | 2bdfa2e03fbe1da80c4c1ea70e557eb5.online | udp |
| US | 1.1.1.1:53 | f39aab2c7026a6b7c52f754a5e785fb5.shop | udp |
| US | 1.1.1.1:53 | 99b514371334ced2c82f709ee85f6f20.website | udp |
| US | 1.1.1.1:53 | 09de95750d3056113a82c32fb0d99ac3.org | udp |
| US | 1.1.1.1:53 | af1004be15890e79d850aa6a85010c8f.com | udp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 172.217.16.232:443 | ssl.google-analytics.com | tcp |
| US | 1.1.1.1:53 | accounts.google.com | udp |
| US | 1.1.1.1:53 | accounts.google.com | udp |
| BE | 66.102.1.84:443 | accounts.google.com | tcp |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.169.14:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 216.58.201.100:443 | www.google.com | tcp |
| US | 1.1.1.1:53 | update.googleapis.com | udp |
| GB | 172.217.16.227:443 | update.googleapis.com | tcp |
Files
/data/data/com.emulation_products69/files/.u
| MD5 | 77dc50489b9323274732d27dc8a4e803 |
| SHA1 | 0e02a3595b62489d0739d771881da8604d117c65 |
| SHA256 | c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820 |
| SHA512 | 0684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58 |
/data/user/0/com.emulation_products69/[email protected]
| MD5 | 77dd1081a1bc13abf45e7cec8e367a2c |
| SHA1 | 70686eb87d437f3384fe38fb8f701852b5065478 |
| SHA256 | 672b475bdfa3041f1fe0a7613f6c7b21ab7b16e99aa250019a2197201b2f6741 |
| SHA512 | ae6711a2e69cb26b0729f7ea8718909122a228f13d7cdba9ff218b156d20d0224eeb02ce7847de7c810a1a8fce16d4f1d8c493a0c30673a9b36882de638b6c9a |
/data/data/com.emulation_products69/oat/x86_64/[email protected]
| MD5 | a35aad6e062ef332b22be45ec652f495 |
| SHA1 | bb5c1277c020beb72b9d4cec2e831715e02868fe |
| SHA256 | 8ea67a25988a6d0ac51334489062e1f2c5eb321d998fb85194f561833b7a5bc1 |
| SHA512 | 791ab149be9a699350808b5e93475f29e4a46d461fd909ee00ba427979556a05b9d1fa74537e72064b3d9608da33c83a6216d0fd9d6bd460b6b943c64eaa1d19 |
/data/data/com.emulation_products69/.global.com.emulation_products69
| MD5 | 046a414913add6f5bb60072c7db819b6 |
| SHA1 | 451ee4f6809260aec622d772fd329c7d0297a842 |
| SHA256 | b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a |
| SHA512 | 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c |