Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    08-11-2024 22:44

General

  • Target

    e43baf11749eedc282f6e1e8a530df2394fa40e490fa796b91f8713537cebe85.apk

  • Size

    537KB

  • MD5

    761a7767e20688c36789bb6734711315

  • SHA1

    e0b3689d5546067a9d4038028806bb44566a2231

  • SHA256

    e43baf11749eedc282f6e1e8a530df2394fa40e490fa796b91f8713537cebe85

  • SHA512

    ad5357817760f8402c20dbcfaebf0b79451f8e8de1e963a6b85e0618aa94566fa36d76ce682c89bd45d3d31659506a6c9d51f0c8136218e8aff7fe40539d779d

  • SSDEEP

    12288:Q3A5cytDs512wkZMaflsdrMgB0aOsSYRpS+DdSmoo282Kfg48W4le:a1aZ5lk/BO0RNQml2PVNe

Malware Config

Extracted

Family

octo

C2

https://strmbas.net/YjYzOGZlODE1ODIx/

https://stormslva.net/YjYzOGZlODE1ODIx/

https://androstrm.com/YjYzOGZlODE1ODIx/

https://strmphone.net/YjYzOGZlODE1ODIx/

rc4.plain

Extracted

Family

octo

C2

https://strmbas.net/YjYzOGZlODE1ODIx/

https://stormslva.net/YjYzOGZlODE1ODIx/

https://androstrm.com/YjYzOGZlODE1ODIx/

https://strmphone.net/YjYzOGZlODE1ODIx/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.quickheadrkgs
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4501

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.quickheadrkgs/cache/oat/okhtpojojpiyazd.cur.prof

    Filesize

    393B

    MD5

    4d39936e7aea2ed128790ae8b4c3eead

    SHA1

    d8df6f54b51eaf1ec4787d0f75ec7adef47a73c7

    SHA256

    ee2c20a7c57652776fb278a0fe42b44d7a74779c1c3c2a797e7fe85623c0f032

    SHA512

    fe4b574fd254b2989b3815426f759426c0d46f5d1bf6cadb391dde6168ea8f167afde941ebc870b0e677510bc6f61b5a9d74154765242849a5aecba73c63004b

  • /data/user/0/com.quickheadrkgs/cache/okhtpojojpiyazd

    Filesize

    450KB

    MD5

    4a931bfa1d0a215eb48d8faa3c652b0b

    SHA1

    51c9d3b23d002d201b168975b7f8be0424f2174a

    SHA256

    280e127678c21567ce7911f5c8f0c06c06d83dee58c4488f44768354123fe51b

    SHA512

    b2a1e85bb8b1e56e1924306eee279559df8538b2b425d6310627e0347051c3dd8d826c5d4df52e8f2d4f803d942e0762fcd9548b4ab6196744f4a20f9f737507