Resubmissions
12-11-2024 07:36
241112-jfc3sswrhw 10Analysis
-
max time kernel
149s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
12-11-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
.pending-1690617237-chrome-update01216.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
.pending-1690617237-chrome-update01216.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
.pending-1690617237-chrome-update01216.apk
-
Size
1.3MB
-
MD5
f1a8bde16690e181588a6e2609b20c96
-
SHA1
5cd203c9a378e389714320c66530010036f2fb6e
-
SHA256
fcb5665e81ddec0bbe57bdc2acf443ea5f5a521e50d085f978f2dc4e5ce01d0a
-
SHA512
9536f6be977f8d2e12e55205fe4818d2cbaefe6e1035e9151c0080052030ab5b6e5fee831cc879ca084b33dfeb932e76bf4a9bd017827cb1b98c4513a4151caf
-
SSDEEP
24576:WHyV2tCKvYy/Xm+B2akhR6Qf9cGEGXN8ZODZH7mqzCeJClAE4KvAS3u:WS1sYyP/2akhRFCGX+ZGZbmqmyClAE4D
Malware Config
Extracted
octo
https://29p0jb1nyxmt.biz/MTU2OWE0NzJjNGY5/
https://fmri3i4567ng.biz/MTU2OWE0NzJjNGY5/
https://ahs8a4mz8ehq.online/MTU2OWE0NzJjNGY5/
https://518tudu7579h.xyz/MTU2OWE0NzJjNGY5/
https://4jsi8qj3203u.org/MTU2OWE0NzJjNGY5/
https://4n51yg9firr3.site/MTU2OWE0NzJjNGY5/
https://0eto0mhk6g7b.top/MTU2OWE0NzJjNGY5/
https://icbm5s5oj028.xyz/MTU2OWE0NzJjNGY5/
https://yjf241z0uu75.info/MTU2OWE0NzJjNGY5/
https://wanrflitrnvn.asia/MTU2OWE0NzJjNGY5/
Extracted
octo
https://29p0jb1nyxmt.biz/MTU2OWE0NzJjNGY5/
https://fmri3i4567ng.biz/MTU2OWE0NzJjNGY5/
https://ahs8a4mz8ehq.online/MTU2OWE0NzJjNGY5/
https://518tudu7579h.xyz/MTU2OWE0NzJjNGY5/
https://4jsi8qj3203u.org/MTU2OWE0NzJjNGY5/
https://4n51yg9firr3.site/MTU2OWE0NzJjNGY5/
https://0eto0mhk6g7b.top/MTU2OWE0NzJjNGY5/
https://icbm5s5oj028.xyz/MTU2OWE0NzJjNGY5/
https://yjf241z0uu75.info/MTU2OWE0NzJjNGY5/
https://wanrflitrnvn.asia/MTU2OWE0NzJjNGY5/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-6.dat family_octo -
pid Process 4243 com.nextobjectygy -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.nextobjectygy -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.nextobjectygy/app_DynamicOptDex/TGl.json 4269 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nextobjectygy/app_DynamicOptDex/TGl.json --output-vdex-fd=41 --oat-fd=43 --oat-location=/data/user/0/com.nextobjectygy/app_DynamicOptDex/oat/x86/TGl.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.nextobjectygy/app_DynamicOptDex/TGl.json 4243 com.nextobjectygy /data/user/0/com.nextobjectygy/cache/mylywfwk 4243 com.nextobjectygy /data/user/0/com.nextobjectygy/cache/mylywfwk 4243 com.nextobjectygy -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.nextobjectygy Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.nextobjectygy -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.nextobjectygy -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.nextobjectygy -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nextobjectygy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nextobjectygy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nextobjectygy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.nextobjectygy -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.nextobjectygy -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.nextobjectygy -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.nextobjectygy -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.nextobjectygy -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.nextobjectygy -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.nextobjectygy
Processes
-
com.nextobjectygy1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4243 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nextobjectygy/app_DynamicOptDex/TGl.json --output-vdex-fd=41 --oat-fd=43 --oat-location=/data/user/0/com.nextobjectygy/app_DynamicOptDex/oat/x86/TGl.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4269
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5fc718b98b64fe2ed82e1e2c0d9967266
SHA1cc7975eca0b8f2780d99f32ebb6e5ec8226fe078
SHA2564b91d174ff6bbc4d85830d59f99135780a4e10c0cd869723bcb1a5dd99d1a0ff
SHA512fe8df4b8730c8d2c6beebdaa01c7e79a761d7a75ee13705c2dcc5a82a0f3f5d7c1bd83a64e37f5ecec6950b53f2f7e8b0d587654c7301bb2a55f7541a94b9e90
-
Filesize
2KB
MD5b50a3902d820db59c863242b523ea612
SHA12f7522c043c173916095aa45be39ffdebc49828e
SHA256631a6fe0c17c52ccc4ceb67e7296b575857b36fb7dd1965a71fa5abb45f01036
SHA512ebaec637417f0f5e750ab0a3b35945bf17ea729de91d4253b1206986c38e6908f6e2433ef4f599a444c635d11a9826761fbfd33c68d980418058f1903b99e076
-
Filesize
271KB
MD54889f001450b34d1d50b0a8d1341a5e0
SHA10d015e40994ee61bd4582b34c18db5e762418a77
SHA256eeeb9de74c2137c1d79a72da567e6610ce974d2d2a2f7ab38472dbb76dac0674
SHA5120fabb069e66fd7b32cd03f6bec0228d2a74649ff35ef446943f0f92fe9d08dbecc23189a36f2c18265d2f89b217ea604897125419c3aa841b8a4a8a032c85e3d
-
Filesize
440B
MD5030ca0af933090d9d70823bea9e81607
SHA1a4e0fa7cd51312166086a250907ed171791492ef
SHA2563f03a209f911a1b10791079e179ff47e5509d0079d3b241664fbf3c8e61c9bc3
SHA51238cb4c6c701e291ebac24c3a47a70c17ff8bbef8fedab31cf80cd58af8e63f5b95c0f60258ec1fbb07ba99163a2917ea53f59d22a29cdd43f88afd3e13a5bf48
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
230B
MD582c65b65a2bad346fa4a629b1f779002
SHA178211bf725dbf61a9d67b993729c3127b13d6809
SHA2564919c0e27749d1262dcb90dedb42c2b6f84689938b601b3689c8be6b05bc842d
SHA512949374597925c8e05fac9fb6a214da97c58ecc2a5ad6f4ff1cdf7572af20ef9f3a8c9bb8414222e77cb37b2493725a4c49df065061217a6134144a1a8f89add8
-
Filesize
54B
MD5e27a8bdde37897f779d324effeeb688f
SHA163754ca122d6965a7202f76bafa70fa786409db3
SHA25690410cbe4a9783512a18cdee7c17618f2c3a055e137b21a51cff70a0cd132237
SHA51270698159e5198fda331179143502ba0499a7d8a0255bbf2a5bec2f36d10e376122c950258e24af7fe5b3bbbe685bec37dd205e78f34fafa4976ce9b566de342c
-
Filesize
63B
MD5c45ba7384830ddf6da0e39e8c069c51b
SHA15ba74849a9907108776414029e83c6f90935ceaa
SHA2561c9899faa752cac95d3611e114d50a854275ad07e07720a312c0c98288547767
SHA512d61942ff84d9e1980796d2c25ae9059d36f4ea335ed60f1c7256f009219fa161b931d4ca43688da742bc348500bac55850a9e49cffafea76dee2dcc780147b2c
-
Filesize
423B
MD53238dad0c9582c82eb889074c1024cda
SHA1561e989be3a348847a5d0cd63e871ed8b3b235f9
SHA25663426bc655493636287e607aa0245e0de1cd9251515c13a1e44208a4331b572f
SHA512c1174f415c985ee0e6822cae28d80fa3a835b070099010cfc773c7e8c669b8f33698465ab7dcd427f1bc35cb1d81998d88f831e8e38563fc32c207596d560acd
-
Filesize
6KB
MD5603abf42f0ef8bf8780c6d483d8e40ac
SHA1b04671e952552c8949b6d08974575561fa2857a0
SHA256462984ea3c11fcc928436ed34fd0920453ba0518f02946df13eb189a8890976b
SHA512c359ee524194294bdd8b04cebc751ba1db5a7653a2be86c6310c665ac1ef39ce0fe4873cd3e05197c83e20b1cbfc511f8bcf986abe5792f1094c166df9640b2f
-
Filesize
6KB
MD558e846b1e78a29b77a81113a915ed6cc
SHA1e929dd35bc6cd2dc4417df46dcadc7a32b50875d
SHA2561aa5a09744c24bd1b999846cd4f742b179fe3beb27f5467c161796c6357ba807
SHA5125988e11a5b46ed74fabe6b4c72d7fff207e036bbd637e945c7657eaad078af1bcf1e6d4b2255213a0b86ac6fd4145a7bcbd7a1c08296c9f50e34ea0ae9c3857d