Analysis

  • max time kernel
    148s
  • max time network
    133s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    13-11-2024 22:04

General

  • Target

    980ecd2ad21b4c5e6abfdbf3b7ebddc36c927e3f6fec8d749154e5e42e4d81d6.apk

  • Size

    537KB

  • MD5

    3d015ebf05080ab00273d208fa1b6743

  • SHA1

    5e92c5b12b5fbe2a5289b425638a11a188f779c6

  • SHA256

    980ecd2ad21b4c5e6abfdbf3b7ebddc36c927e3f6fec8d749154e5e42e4d81d6

  • SHA512

    865ebf19d1ba5a08473acae8e4ac84d70cb5104e25ca1ce6fd068f2a9dd9e34c18ebbdc4e5c400e2fd0e5850781b9081eb43df6e0abbde880d698d30e977df92

  • SSDEEP

    12288:9RXLVie3QvV3wa0ooJIPK0ZSIOWOMNRpjcBd5unflfHoog+m:JQRyMNUBd5unfHm

Malware Config

Extracted

Family

octo

C2

https://stormslva.net/ZjkyOTc3MWMxMzky/

https://androstrm.com/ZjkyOTc3MWMxMzky/

rc4.plain

Extracted

Family

octo

C2

https://stormslva.net/ZjkyOTc3MWMxMzky/

https://androstrm.com/ZjkyOTc3MWMxMzky/

https://strmphone.net/ZjkyOTc3MWMxMzky/ https://slmbebekstrm.net/ZjkyOTc3MWMxMzky/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.helppiece92
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4507

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.helppiece92/cache/bdzumzxp

    Filesize

    450KB

    MD5

    9c41ec32d91d9ecf8c7dfc3fcca397b2

    SHA1

    950b8777a265eb3bc01a5aa4ea1eb3437bff31fc

    SHA256

    f49f331c250c090ebedd3dc12304be1858c0dca91feb3a7623ccbadcc8e89d55

    SHA512

    5c58cdaf7812328d4d420c631c5494f5d4107da8370557b4b32b09d1336ee7af4db519b4a6ceb392887d156cb32eb86b35a195b90c82165f17223983342899d8

  • /data/user/0/com.helppiece92/cache/oat/bdzumzxp.cur.prof

    Filesize

    318B

    MD5

    87f7f5e271f5c32c7717026bf39dcb08

    SHA1

    3b7743c4c46131d910a6579024e983aa79bde35c

    SHA256

    9e5b43bf1f8aca82860f9da8b7812f39878af8ce048891347a8a8d5c0ca8dba8

    SHA512

    6f0e213298cfdda38cf654e02c343264b1d14ba44a42ec98daa6d84791f67cd4e8fb3988363b112c66c88facd5f39d4a0c2b27052754eec5c65c1d940f2964b8