Analysis
-
max time kernel
142s -
max time network
143s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
11/11/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
665876d78d95eedf3d084a5762516626d1d58ddbe63424a3d279e6d17b6398cc.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
665876d78d95eedf3d084a5762516626d1d58ddbe63424a3d279e6d17b6398cc.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
665876d78d95eedf3d084a5762516626d1d58ddbe63424a3d279e6d17b6398cc.apk
-
Size
2.2MB
-
MD5
b48adbf4a53d2a3ff40ad27145e64880
-
SHA1
f1b18f80f6a8603531f4b2cd30a2d232324ec31e
-
SHA256
665876d78d95eedf3d084a5762516626d1d58ddbe63424a3d279e6d17b6398cc
-
SHA512
38d919de7b9589123f1f2bd1c3273fea7a008a21d4264db4c08740f414f36ae1f4977012dec79163cda87d8fbde29eea16fd2ea7e7151a17b7d0129d3c8fb4a1
-
SSDEEP
49152:a2KQuqzzp/RSxYkbJSSo0hLk5Y3Pk730T/JVwaQud99D8otQNyYC7QHmGNVg:a5QuqPp/RSxYkbpokLkY3kkkaPdP8/Na
Malware Config
Extracted
octo
https://cizgifilmlervekarakterhikayeleri.xyz/MDQ2MTZjMDhlZDQy/
https://cocukanimasyonvesinemaustalari.xyz/MDQ2MTZjMDhlZDQy/
https://masalvecizgifilmkahramanlari.xyz/MDQ2MTZjMDhlZDQy/
https://sevimlikarakterlervesahneefektleri.xyz/MDQ2MTZjMDhlZDQy/
https://cizgifilmsanatvesinemaevreni.xyz/MDQ2MTZjMDhlZDQy/
https://eglencelihikayelervecizgidunyasi.xyz/MDQ2MTZjMDhlZDQy/
https://animasyonyapimcilariveoyuncular.xyz/MDQ2MTZjMDhlZDQy/
https://renklihayalguclerianimasyonlar.xyz/MDQ2MTZjMDhlZDQy/
https://cizgifilmklassikleriyenidonem.xyz/MDQ2MTZjMDhlZDQy/
https://eglencelianimasyonprojelerlistesi.xyz/MDQ2MTZjMDhlZDQy/
https://cizgianimasyonvedijitalhikayeler.xyz/MDQ2MTZjMDhlZDQy/
https://kahramanvetuhafcanlilarhikayesi.xyz/MDQ2MTZjMDhlZDQy/
https://eglencevedostcancizgifilmler.xyz/MDQ2MTZjMDhlZDQy/
https://cizgidunyasindakiyenikarakterler.xyz/MDQ2MTZjMDhlZDQy/
https://animasyonvegorselsanatgezileri.xyz/MDQ2MTZjMDhlZDQy/
https://cizgifilmvedegisimkulturler.xyz/MDQ2MTZjMDhlZDQy/
https://renklianimasyonvesanateserleri.xyz/MDQ2MTZjMDhlZDQy/
https://kulturvecizgihikayegirisimi.xyz/MDQ2MTZjMDhlZDQy/
https://cizgifilmtasarimvesanatyonetimi.xyz/MDQ2MTZjMDhlZDQy/
https://yeniyetisimlerveanimasyoncalismasi.xyz/MDQ2MTZjMDhlZDQy/
Extracted
octo
https://cizgifilmlervekarakterhikayeleri.xyz/MDQ2MTZjMDhlZDQy/
https://cocukanimasyonvesinemaustalari.xyz/MDQ2MTZjMDhlZDQy/
https://masalvecizgifilmkahramanlari.xyz/MDQ2MTZjMDhlZDQy/
https://sevimlikarakterlervesahneefektleri.xyz/MDQ2MTZjMDhlZDQy/
https://cizgifilmsanatvesinemaevreni.xyz/MDQ2MTZjMDhlZDQy/
https://eglencelihikayelervecizgidunyasi.xyz/MDQ2MTZjMDhlZDQy/
https://animasyonyapimcilariveoyuncular.xyz/MDQ2MTZjMDhlZDQy/
https://renklihayalguclerianimasyonlar.xyz/MDQ2MTZjMDhlZDQy/
https://cizgifilmklassikleriyenidonem.xyz/MDQ2MTZjMDhlZDQy/
https://eglencelianimasyonprojelerlistesi.xyz/MDQ2MTZjMDhlZDQy/
https://cizgianimasyonvedijitalhikayeler.xyz/MDQ2MTZjMDhlZDQy/
https://kahramanvetuhafcanlilarhikayesi.xyz/MDQ2MTZjMDhlZDQy/
https://eglencevedostcancizgifilmler.xyz/MDQ2MTZjMDhlZDQy/
https://cizgidunyasindakiyenikarakterler.xyz/MDQ2MTZjMDhlZDQy/
https://animasyonvegorselsanatgezileri.xyz/MDQ2MTZjMDhlZDQy/
https://cizgifilmvedegisimkulturler.xyz/MDQ2MTZjMDhlZDQy/
https://renklianimasyonvesanateserleri.xyz/MDQ2MTZjMDhlZDQy/
https://kulturvecizgihikayegirisimi.xyz/MDQ2MTZjMDhlZDQy/
https://cizgifilmtasarimvesanatyonetimi.xyz/MDQ2MTZjMDhlZDQy/
https://yeniyetisimlerveanimasyoncalismasi.xyz/MDQ2MTZjMDhlZDQy/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 2 IoCs
resource yara_rule behavioral1/memory/4291-0.dex family_octo behavioral1/memory/4265-0.dex family_octo -
pid Process 4265 com.logic.resist -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.logic.resist/app_spring/bHxF.json 4291 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.logic.resist/app_spring/bHxF.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.logic.resist/app_spring/oat/x86/bHxF.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.logic.resist/app_spring/bHxF.json 4265 com.logic.resist -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.logic.resist Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.logic.resist -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.logic.resist -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.logic.resist -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.logic.resist android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.logic.resist android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.logic.resist android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.logic.resist -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.logic.resist -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.logic.resist -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.logic.resist -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.logic.resist -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.logic.resist -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.logic.resist
Processes
-
com.logic.resist1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4265 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.logic.resist/app_spring/bHxF.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.logic.resist/app_spring/oat/x86/bHxF.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4291
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5dbfcb6a8ba2d28e9f86203a2ce6bbe47
SHA1f43150c330c4a21b7857a52fdcb6559f1f09a03f
SHA2568ed008f2d0687a900d08b3567e009ea403a49a354d5b4b53376fe6499f6513b8
SHA512a2ca6ee58cc6434175465704657f79f340e380bc94f4f9b8b3fc72015f8829516a897c50fd0f1ba18b21c6497fb8bc1475dc1fc0dc6db056c35a514651218daf
-
Filesize
153KB
MD540518605255aeb4b63b29323e7ea1ee1
SHA102807e2e1fc72139e5f59117b74996076725c4eb
SHA2563ff2eaf6208b717271aa19807374121fb17a71aace2a1d1fee0162f7c6115182
SHA5124f06ff85d483034eb2023523ac9cde3bb09d3db8f9010e25f77ff9cbeb97547992abe2da030e777562f64bb630380471e29ba308e44dddce904500b73d538f65
-
Filesize
451KB
MD5ae3527f1ce2d08875aadf34625cda009
SHA19d04fa06f2d390ce534ecfdce4a6087ebb1a0103
SHA256087eaa2d9cd6e4b82aebaaa49b6ee08e8e2097199d4e36a1fc28261185972f70
SHA5120e138883bceba78254beffe4f4f65cf82be30116fbce5d051da0a937d372d9429d3128280b795688867c4b5205311d67ac3830615b9da86a8eb88ea9dea50943
-
Filesize
451KB
MD5370f1009036c35de25328818d1535f7c
SHA13ee0d398d1738336f413c1761f418f7c0fc96da2
SHA25620a15c3060c160c4086e49b3cc986e7158078f518c624bb8d933b3e05e36fdbb
SHA512964616f3eee09ab69b98d0e54330e3f02d2a90f481dc10ee29dc2df408a50921534bdc7061a49f3c9f822294d5af8fc7afe49c0a94e70b59f53d0772aefadc48