Analysis
-
max time kernel
144s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
14-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
-
Size
605KB
-
MD5
54065c35fe32da0574db961c9e240ae7
-
SHA1
3c6cc2434c9bf37330b44e493ef095606f5a9890
-
SHA256
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9
-
SHA512
7c4a4f793443101d1ae1dae6d80b29a61459676996dcfc5c7d6ec33c8e96c9053062bb12b9876c2f17528ea298323bba469b32f4d39a91ceccb01152fbfbc592
-
SSDEEP
12288:tGafmJEEzKwsA9UDJpTRmrsppztoBqq+80e5M/vs0mtTfgSs4hDLrMhdsF:tNuKwz9EJpTRm+pztwCX4sCgSsIzgdsF
Malware Config
Extracted
octo
https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://34b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://64b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://74b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://894b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139030754567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139033074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b641553903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/1731621668832_classes.dex 4951 com.sciencedarkndf /data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/1731621668832_classes.dex 4951 com.sciencedarkndf -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sciencedarkndf Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sciencedarkndf -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sciencedarkndf -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sciencedarkndf -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sciencedarkndf -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sciencedarkndf -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sciencedarkndf -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sciencedarkndf
Processes
-
com.sciencedarkndf1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4951
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD53bd9cabb74515b21b64e914e6953a74c
SHA1f804da0db7ca7b1576e2027ff210e4d00cd609d0
SHA2562385847cafc2a8cca713ff3513d005e867ff9f12378f786fd4d91a3f684ba89a
SHA5127300ed3520dec772d32c842e394ea8aad08d934b6362aff8df2b129da4b1d0ee14978f21f55212eab35d8899f6957f86f836453e3f76e54b29b8dd00f468ffa0
-
Filesize
1.1MB
MD55add7925b157f5df92649450693ccece
SHA115781303aaf381a326966a0d98b780d0c69ef2e6
SHA2564101a89f1017f5ade35ade98eb4691118a8340fe351283ff625df771e39bd5ca
SHA512b10d3e5ffe9351509a9d5d12fd64194bdd3e12ccccd5961f3665be1f2ab074fb581082f0ba3d70b31b101672ae8628ad7a841d7c19d6601a274b887bed0f78a3
-
Filesize
24B
MD5a4fd6f65ea35f1373365c2adc629f5ca
SHA18d7a14d725f621fb7fe8ba15679499014a82c4de
SHA256c5f0526dd6d33474d8a18eb60a00bbc99abf13d8b59097077333ee9600ec721c
SHA5121ee3d56c31f916ffdafd6a72a2c9f563842df1c4caecf49578f85a09346a4db43465d34c26b2efc07159bf9c74dacd0f6a15ff05d88ab9661a12d265a5e6ce09
-
Filesize
8B
MD54cbe96e91464706f59228fa1923b5a55
SHA14073dedb15c472d7739b5c99ea12aaba1344c150
SHA25678775981f5d049702504413b98f12efa3d0ab92b5ff7ce536f038598e91bbd0d
SHA5127aade165247ea33d44d9ccb8864232c77af70cced38a2d08b9b2e202ffb7535e9fbd1cc48000b575b4dc1cf27c46ec70a7d47a580b74babb239761ebcb0c05f2
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5107525c39bad5ccfd2a85c3b829fe4d2
SHA1333691dfdc29e51bcda640838503220b40c2efa5
SHA25639825efe6d59710f9968b27e300956eb1735729e67fd1caba6af0f175651d514
SHA512c6a8cb55c26b925a1e43281e4df85caf2e491041e12152257ddf72c3ecc5d750bb5a21bdffddc9e81a47b22e05ffabf87ae7eeb39fceb09c4f11649f49b2e44c
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
124KB
MD50b70192d102adc72e28a16c468e20e6c
SHA13cb1dd660a00b4ddf53e7d1903af4ec659a7b0c5
SHA256917f7c8802409cd2dac96ec2b0cd64d5bd6d14d5aa2bbc381890e3e4277380f8
SHA5123662f1c63b5ae49f6d348b65b019ff6834e73c6e0764a1d9e837d560b5261d79175a665b3ebf9e237a7cd4ad5ce1b41098e7992403bde34760ecaa5b407e809d
-
Filesize
177KB
MD5f034deabcbee761e90da65590319096a
SHA1e395f8cd22ec5cac446a1f8ea18b4103ef583df0
SHA25649ca30519c1942baf1099a755c33086cb0ec0e53de5cd23ce17ebd8e53c34cda
SHA512c4103ddcc12cee381a368c76489ff14f98358396f20333d52723d87828e858052f9966d106e295be6fa3b508a19e1054e1121359ad985c1bd03339642b7c1cb3
-
Filesize
16KB
MD5dff9657a19569b9a1aa9c73a31b141c2
SHA10afc4fccec7f12850305d2fe80fba3bd65d45122
SHA256d5b4f1d84404f1fe4628b58b527a4bcc42c98a31f9c1d0da0909294002408747
SHA512bd8b5c1047c878fd8bbc7729146cc39de62dbfecb2dfac01250a4c7b8217f6ff64a25cf6e42074e32d87be7453fa86c9992b4e3e9d3d064d275e896148d42108
-
Filesize
116KB
MD52de19114b57702e2f09f3a7e14930901
SHA12055fd2581d7312923696857e8f229f8a56d5d89
SHA256eaac480fd5fba9091918ba84c7b48c843e00738dd5f92c3bcddd2b4616cce6f0
SHA512721397a52ac3625333396501286f8abfa80f9943e218006ecebcfc69c3a45f46c57650506e630a3ef9c96f8e5789f5d48705a822b38bd8f8198fe1c358df810c
-
Filesize
112B
MD570dc31228829731aaf9fa5a69cca604d
SHA1ab0226225e52ef00d09990284b7f3feb09c83050
SHA2569aba377bb5e3138511de87ac5a75bd1acab0a66bc3651616268ce6cad3c8b09c
SHA5124d72ee9c057bb211b80e19d0ca25a3cada91956cde9d9e922a64f0634305c4a9f88c0305b56247d62c47354295117fe1aceb3fb9dc377f1fcb7312331f5e0c4d
-
Filesize
25B
MD5b9d9e0f8902d129e1aeebff0ae7b725b
SHA1cb0d2b4c9dd60a5c1fc6261fb581bcd3416fe781
SHA25625a822139d06016af8be1296c0242b60e35074f94c713e03323636be1162ce91
SHA512f158a9dc753e0cb41f71a98714ff02198c576bacdd792a6153fdaf6f9a7b52d8cfb6d09099a269d0c1b0d31e2ea5a307ea1db85115bdc6797887a6de36d597f6