Resubmissions
12-11-2024 07:36
241112-jfc3sswrhw 10Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
12-11-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
.pending-1690617237-chrome-update01216.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
.pending-1690617237-chrome-update01216.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
.pending-1690617237-chrome-update01216.apk
-
Size
1.3MB
-
MD5
f1a8bde16690e181588a6e2609b20c96
-
SHA1
5cd203c9a378e389714320c66530010036f2fb6e
-
SHA256
fcb5665e81ddec0bbe57bdc2acf443ea5f5a521e50d085f978f2dc4e5ce01d0a
-
SHA512
9536f6be977f8d2e12e55205fe4818d2cbaefe6e1035e9151c0080052030ab5b6e5fee831cc879ca084b33dfeb932e76bf4a9bd017827cb1b98c4513a4151caf
-
SSDEEP
24576:WHyV2tCKvYy/Xm+B2akhR6Qf9cGEGXN8ZODZH7mqzCeJClAE4KvAS3u:WS1sYyP/2akhRFCGX+ZGZbmqmyClAE4D
Malware Config
Extracted
octo
https://29p0jb1nyxmt.biz/MTU2OWE0NzJjNGY5/
https://fmri3i4567ng.biz/MTU2OWE0NzJjNGY5/
https://ahs8a4mz8ehq.online/MTU2OWE0NzJjNGY5/
https://518tudu7579h.xyz/MTU2OWE0NzJjNGY5/
https://4jsi8qj3203u.org/MTU2OWE0NzJjNGY5/
https://4n51yg9firr3.site/MTU2OWE0NzJjNGY5/
https://0eto0mhk6g7b.top/MTU2OWE0NzJjNGY5/
https://icbm5s5oj028.xyz/MTU2OWE0NzJjNGY5/
https://yjf241z0uu75.info/MTU2OWE0NzJjNGY5/
https://wanrflitrnvn.asia/MTU2OWE0NzJjNGY5/
Extracted
octo
https://29p0jb1nyxmt.biz/MTU2OWE0NzJjNGY5/
https://fmri3i4567ng.biz/MTU2OWE0NzJjNGY5/
https://ahs8a4mz8ehq.online/MTU2OWE0NzJjNGY5/
https://518tudu7579h.xyz/MTU2OWE0NzJjNGY5/
https://4jsi8qj3203u.org/MTU2OWE0NzJjNGY5/
https://4n51yg9firr3.site/MTU2OWE0NzJjNGY5/
https://0eto0mhk6g7b.top/MTU2OWE0NzJjNGY5/
https://icbm5s5oj028.xyz/MTU2OWE0NzJjNGY5/
https://yjf241z0uu75.info/MTU2OWE0NzJjNGY5/
https://wanrflitrnvn.asia/MTU2OWE0NzJjNGY5/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.nextobjectygy/app_DynamicOptDex/TGl.json 4347 com.nextobjectygy /data/user/0/com.nextobjectygy/cache/mylywfwk 4347 com.nextobjectygy -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.nextobjectygy Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.nextobjectygy -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.nextobjectygy -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.nextobjectygy -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.nextobjectygy -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nextobjectygy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nextobjectygy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nextobjectygy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nextobjectygy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.nextobjectygy -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.nextobjectygy -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.nextobjectygy -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.nextobjectygy -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.nextobjectygy -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.nextobjectygy
Processes
-
com.nextobjectygy1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4347
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5fc718b98b64fe2ed82e1e2c0d9967266
SHA1cc7975eca0b8f2780d99f32ebb6e5ec8226fe078
SHA2564b91d174ff6bbc4d85830d59f99135780a4e10c0cd869723bcb1a5dd99d1a0ff
SHA512fe8df4b8730c8d2c6beebdaa01c7e79a761d7a75ee13705c2dcc5a82a0f3f5d7c1bd83a64e37f5ecec6950b53f2f7e8b0d587654c7301bb2a55f7541a94b9e90
-
Filesize
2KB
MD5b50a3902d820db59c863242b523ea612
SHA12f7522c043c173916095aa45be39ffdebc49828e
SHA256631a6fe0c17c52ccc4ceb67e7296b575857b36fb7dd1965a71fa5abb45f01036
SHA512ebaec637417f0f5e750ab0a3b35945bf17ea729de91d4253b1206986c38e6908f6e2433ef4f599a444c635d11a9826761fbfd33c68d980418058f1903b99e076
-
Filesize
6KB
MD558e846b1e78a29b77a81113a915ed6cc
SHA1e929dd35bc6cd2dc4417df46dcadc7a32b50875d
SHA2561aa5a09744c24bd1b999846cd4f742b179fe3beb27f5467c161796c6357ba807
SHA5125988e11a5b46ed74fabe6b4c72d7fff207e036bbd637e945c7657eaad078af1bcf1e6d4b2255213a0b86ac6fd4145a7bcbd7a1c08296c9f50e34ea0ae9c3857d
-
Filesize
271KB
MD54889f001450b34d1d50b0a8d1341a5e0
SHA10d015e40994ee61bd4582b34c18db5e762418a77
SHA256eeeb9de74c2137c1d79a72da567e6610ce974d2d2a2f7ab38472dbb76dac0674
SHA5120fabb069e66fd7b32cd03f6bec0228d2a74649ff35ef446943f0f92fe9d08dbecc23189a36f2c18265d2f89b217ea604897125419c3aa841b8a4a8a032c85e3d
-
Filesize
382B
MD50b930bd13c6853be76efa7f4d27fbc11
SHA194198c604d5f2c7c3a5b21f4c1b78c6a23cfc91a
SHA256be12afa250a02157686a2581eda37cb58e6b2d5dbfa101be82a234b161880784
SHA512c00fc4056a843a803f498213230a85b74dc6e7bc319eb949f709a4c8bc74c7ec5830fe302dad1351690c270f5ec34ae1e0324dfebb698a92264e11ad5e536b2f
-
Filesize
60B
MD566a78a25fba3416ebae0a63a0a5c809c
SHA1fc41ad418b239222cd2033279dd181cd9b21038a
SHA256394857d4574691207469d9090e7a7642303d8e1eddcd555ba194a2c9481d05ab
SHA512f4db78d2e46d867df195f61ed73e29dff5e22693e48e8d039a23c13fee6ebc9617f9d78c31c0254d00d3296cbd47ace770ae750d29e941eb478ec4702392ba21
-
Filesize
79B
MD54ea6211764473f7a47c53664dfcd4c4b
SHA1b01043606ba260a30b54b693d03691ac8f3cf8c6
SHA256aa9682a70dd1533b1a5774f12980a796f7127a5826f477e79968f43212711025
SHA51215473874ebffc5e9ce6dded6b7bcfca23fd70366cc8273397cda839fea946346997464dddc93e42b65e638db0c5b690614bd1f767b3f1d6a6b866cf99a5d04ad
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
214B
MD57ba1c5a422c83e495ae5328eb476b9be
SHA17a1d6280566a64959c8bbb8e3f6cd042b638dc6f
SHA25675518c3e1fa523dd5749a48b8f89662239cd5e637795a3fd071ac751c2e61ff7
SHA51280d0a6289e5699569ab14dce3ad79dc0e85c97f363c2824f8ee5efcee463f80aeff8cf0db33226a79b3050dc8f3bd9f61e816e63f987a0ffeace7005aacc22ee
-
Filesize
54B
MD5e0dc6411c755290db888194ea40b6325
SHA15ed6c427510e4939c8b23204821091ec4edd9437
SHA256a1e54c04a14d3a4b0394723d128114ec6c42a24cec67be9722e37ac4ffe504f8
SHA512f94209a88728c2455d8b699354287a3494f7a4216e94442720331c20adef8bab36755722c9332156216e3fb5529da303baa3f36935b142a1d657deee8a891cd6