Analysis
-
max time kernel
64s -
max time network
149s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
14-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
-
Size
605KB
-
MD5
54065c35fe32da0574db961c9e240ae7
-
SHA1
3c6cc2434c9bf37330b44e493ef095606f5a9890
-
SHA256
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9
-
SHA512
7c4a4f793443101d1ae1dae6d80b29a61459676996dcfc5c7d6ec33c8e96c9053062bb12b9876c2f17528ea298323bba469b32f4d39a91ceccb01152fbfbc592
-
SSDEEP
12288:tGafmJEEzKwsA9UDJpTRmrsppztoBqq+80e5M/vs0mtTfgSs4hDLrMhdsF:tNuKwz9EJpTRm+pztwCX4sCgSsIzgdsF
Malware Config
Extracted
octo
https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://34b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://64b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://74b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://894b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139030754567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139033074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b641553903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 2 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_octo behavioral1/memory/4224-1.dex family_octo -
pid Process 4224 com.sciencedarkndf -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/1731621669176_classes.dex 4224 com.sciencedarkndf /data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/1731621669176_classes.dex 4252 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/1731621669176_classes.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/oat/x86/1731621669176_classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/1731621669176_classes.dex 4224 com.sciencedarkndf -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sciencedarkndf Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sciencedarkndf -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sciencedarkndf -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sciencedarkndf -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sciencedarkndf -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.sciencedarkndf -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.sciencedarkndf -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.sciencedarkndf -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sciencedarkndf -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sciencedarkndf -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sciencedarkndf
Processes
-
com.sciencedarkndf1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4224 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/1731621669176_classes.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/oat/x86/1731621669176_classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4252
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD53bd9cabb74515b21b64e914e6953a74c
SHA1f804da0db7ca7b1576e2027ff210e4d00cd609d0
SHA2562385847cafc2a8cca713ff3513d005e867ff9f12378f786fd4d91a3f684ba89a
SHA5127300ed3520dec772d32c842e394ea8aad08d934b6362aff8df2b129da4b1d0ee14978f21f55212eab35d8899f6957f86f836453e3f76e54b29b8dd00f468ffa0
-
Filesize
1.1MB
MD55add7925b157f5df92649450693ccece
SHA115781303aaf381a326966a0d98b780d0c69ef2e6
SHA2564101a89f1017f5ade35ade98eb4691118a8340fe351283ff625df771e39bd5ca
SHA512b10d3e5ffe9351509a9d5d12fd64194bdd3e12ccccd5961f3665be1f2ab074fb581082f0ba3d70b31b101672ae8628ad7a841d7c19d6601a274b887bed0f78a3
-
Filesize
24B
MD5f68ca7b74fcc15fa7c14e13a34b07714
SHA108dc930b38826d1c42c2f287df69c4b6ae4ac3da
SHA2563d8d6dd70bf69bee0938e0f344542cfed69c1d0358f1a91378146c93311d9420
SHA512956bcdeaba714f3c695c6f54b130a90f368e9ecd198d91fcaa1e205fac812169e48ef03b750b6e0f4c44881e6f9fa1dbabf3c3ad5354579851675da2a4ee5a00
-
Filesize
8B
MD5533f5c04bb28ad7245ee437d6e32451e
SHA1dace25f5c03a1df316c9c7e19206e4a3747bc3df
SHA256da46341c602b0e51b80f7fedc62a22ecf54cf9eac9fdb7fb2c260194b9649a1e
SHA51280dfc677ebba0ebb170172092448012067b18cb69ca92585879f3d1ff2b4eea6d3ed478b9415aedba0b886e93099e918dc537bc7d551a2c30cf3b09ba5317c13
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD58fdd317c3abd89dfc8159001661a7590
SHA10dda5fbc9de2ea8f51e7efa1cb21a89e551c88cd
SHA256737891b056c1b25d76b1f44f59d6291581618cfca9badcc7c9e3d690df38d221
SHA512809235940397ed693a593f477036767e7a858b289fc16fb2b9f1bcebd614ad0b9a8e38fef398f4af49cb2050455c56482b38405729ae5ffb9ca702d0e7bcbcd8
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5bfaa5e28bd7c4b381237ba14b39566a3
SHA1e4e025d7cc7af8b2bc85e55ec59028ddc5164977
SHA2568231444c55e370fd3b4a08762d61a67317ff4505caa6b2a8e817b377a3020f13
SHA512c00198544089881073b110554f6cbbfa7efef360aadc97cdacb9b141955f2333252f03dbbefd54dca0453a49c72e9fef754424083d6fdd24bb986ddf62485eaa
-
Filesize
116KB
MD5626049ba201f189ad1b639010fd750a7
SHA1e1d8be8756f8893ac6bf0bf512f74149060227bf
SHA2564c7c1586012bc878876ea641162b594913373404e3e6d985e803c9347e0795fc
SHA512fd3890b20e0fc1acff68797e88cd9975f3a64de8a4efb6442d0cc13b49fdbb7fbd33d0340738e7ee41972944738c4683e873807d530f551b4152e204f570b63e
-
Filesize
124KB
MD5f6db6f76194176992859f0fae7db6921
SHA1ecb3d94a01e1fc324dcfbbb7911ae30302ed0ebb
SHA2567240d1c52cce88d0fc120e8d9b6499ec45c3d2b0a87b62361750c5f4d99982e8
SHA512d051d3727c4d2082cdb10619372c95e0333450948b57ac37849d163dcf2ccae33669f061890f81bb406ab0726ceec5682d3ba52355184e293c21a0c5b710631f
-
Filesize
177KB
MD5c4048e61c3360c1cfccb7d13f526fa0e
SHA1ddd00df48743896bdafcff0b2783502ae7db02ac
SHA256158b187aec67ddb24c0ff53034601c5762e14bf098c09db640f677277f221b4c
SHA5127df6c507e6f3cd6ef55bb9e1369415bd9d4dbad4b5561a8ba4acf85ddf39b9667a9fe4c3c675d3823d3efc6cd00511193308fad272c30e01b3dd92ef39ce6533
-
Filesize
112B
MD570dc31228829731aaf9fa5a69cca604d
SHA1ab0226225e52ef00d09990284b7f3feb09c83050
SHA2569aba377bb5e3138511de87ac5a75bd1acab0a66bc3651616268ce6cad3c8b09c
SHA5124d72ee9c057bb211b80e19d0ca25a3cada91956cde9d9e922a64f0634305c4a9f88c0305b56247d62c47354295117fe1aceb3fb9dc377f1fcb7312331f5e0c4d
-
Filesize
118B
MD5354fe332acdf93fc44065d3b0e3c2497
SHA13d6589d55cbafcd3562ef1f13fd8140cc260d245
SHA256cddc2c9c147852e5878539f8c7cd2d5755b48bf31cc7ed12d7d7f633997e2e2d
SHA512981d97e25288d9bf96ceea9eed7c1a14abfce319fe632925d61abda68856c6eafe00636eec3e7bff50156c72a4e50b72c267da92a0489d526ee48625d7d55fac
-
Filesize
1.1MB
MD5af62cda06280cd06dc2ae879fd6303f3
SHA13d8ac43af48407a5b9363131caa0116d095e4624
SHA2561960444cfbda394d25339f1dbe46ca3a6fdc660e20be7b5aa8ab6f946662e548
SHA5121fe982cfda1c339963a025c21df001f3361157fa6aef5ac940bbb51c129c70c3acb2f286c711e87b61df48ce64c6f1fad34c25e8286db95a79c8a7fba598cb19