Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
14-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9.apk
-
Size
605KB
-
MD5
54065c35fe32da0574db961c9e240ae7
-
SHA1
3c6cc2434c9bf37330b44e493ef095606f5a9890
-
SHA256
8ff6f83824ff1a1930d9b85c956d3c454ef553391beef516c8c922a221fa7fe9
-
SHA512
7c4a4f793443101d1ae1dae6d80b29a61459676996dcfc5c7d6ec33c8e96c9053062bb12b9876c2f17528ea298323bba469b32f4d39a91ceccb01152fbfbc592
-
SSDEEP
12288:tGafmJEEzKwsA9UDJpTRmrsppztoBqq+80e5M/vs0mtTfgSs4hDLrMhdsF:tNuKwz9EJpTRm+pztwCX4sCgSsIzgdsF
Malware Config
Extracted
octo
https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://34b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://64b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://74b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://894b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139030754567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139033074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b641553903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/1731621665862_classes.dex 4776 com.sciencedarkndf /data/user/0/com.sciencedarkndf/code_cache/secondary-dexes/1731621665862_classes.dex 4776 com.sciencedarkndf -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sciencedarkndf Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sciencedarkndf -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sciencedarkndf -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sciencedarkndf -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sciencedarkndf -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sciencedarkndf -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.sciencedarkndf -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.sciencedarkndf -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.sciencedarkndf -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sciencedarkndf -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sciencedarkndf
Processes
-
com.sciencedarkndf1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4776
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD53bd9cabb74515b21b64e914e6953a74c
SHA1f804da0db7ca7b1576e2027ff210e4d00cd609d0
SHA2562385847cafc2a8cca713ff3513d005e867ff9f12378f786fd4d91a3f684ba89a
SHA5127300ed3520dec772d32c842e394ea8aad08d934b6362aff8df2b129da4b1d0ee14978f21f55212eab35d8899f6957f86f836453e3f76e54b29b8dd00f468ffa0
-
Filesize
1.1MB
MD55add7925b157f5df92649450693ccece
SHA115781303aaf381a326966a0d98b780d0c69ef2e6
SHA2564101a89f1017f5ade35ade98eb4691118a8340fe351283ff625df771e39bd5ca
SHA512b10d3e5ffe9351509a9d5d12fd64194bdd3e12ccccd5961f3665be1f2ab074fb581082f0ba3d70b31b101672ae8628ad7a841d7c19d6601a274b887bed0f78a3
-
Filesize
8B
MD5248b8882fa473f3602819b8ae4cdef90
SHA1a99bf2f595f747a3a4c3b8ed1d4b9e82a01dbb07
SHA25607d70b2f100827c1c2fa0e718bb5c75a95b61f325b78952f887c837b202e3019
SHA512b4673e544c2f7c006fe55cac50b835aeafbc3dcc41b7adb981244177bcfe0355fdf666161a156a8541e69261818b8a523255bf54bd38e006ab9e561c4f573c4d
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD501568f8f6124a06b2017272b276be647
SHA1d1c47e3988450b271a5c2f0e0348cf2e04393b9f
SHA256c83ffacdd096802e59229b0c53e9fe0b26b2e459d7ee80360229a64a54e6338a
SHA5125894cdf7aa162a6392e48030176dde5d10c22c02bc7e773a04b2921f50274cf7564473a90cb6e92c5087c1434f70cf6fa9569a81208a7bbb7d5bffaad877ac83
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
169KB
MD557a276e99de26f9f71f9758380883eca
SHA1e371b2d6a70c684d46dbe139e0617e8395a5b6e4
SHA2561cf39bf2e36f449d12b0ada223c34bd62fd4dc20e140ab4e4f312bc56f7e4cf2
SHA5120c5b6ca90fc6b143221a3834fccf8354ac50c684100705016d4026f988fcd7c2561430f256a652c4602f64be66987f0a51070f5e7f1f8f62d9a3aadb9f260ba8
-
Filesize
16KB
MD57d1543de8da31be863ee46ae3441dc6a
SHA1e43b9bcdd277791f9d513fd1c663659a0299bae1
SHA2566e5f2709407653d6195ba4002f34d2f9905e69e45757a78c32ceb5847ed282fe
SHA512179cb1f22a7998d0a33fbaaddc1ebb485827f056f8de899702c97445e653e03eaf2e3265fbbb62f2ecceedb16ecb376972b0dfe055a18ef69a007bfcd2621b53
-
Filesize
116KB
MD5ef8d0999e7bcc8dab1cbadec2b04c5f8
SHA1144b373581b8d3011b77be3d38891e0ddfc4ab59
SHA2563d8cc1e9b2bcfc7ca3982169dfbfa78029027be50fe97ab16f8dc5e41e2792f2
SHA512e335bef840445361c04ecac280ff03466cbd1fb0a40a8fd632d0ed2048c9e83c2137f017f3d84c747b64d4c9a0b8186585404480d201d8335532dac7f7d1702e
-
Filesize
112B
MD570dc31228829731aaf9fa5a69cca604d
SHA1ab0226225e52ef00d09990284b7f3feb09c83050
SHA2569aba377bb5e3138511de87ac5a75bd1acab0a66bc3651616268ce6cad3c8b09c
SHA5124d72ee9c057bb211b80e19d0ca25a3cada91956cde9d9e922a64f0634305c4a9f88c0305b56247d62c47354295117fe1aceb3fb9dc377f1fcb7312331f5e0c4d
-
Filesize
25B
MD5b9d9e0f8902d129e1aeebff0ae7b725b
SHA1cb0d2b4c9dd60a5c1fc6261fb581bcd3416fe781
SHA25625a822139d06016af8be1296c0242b60e35074f94c713e03323636be1162ce91
SHA512f158a9dc753e0cb41f71a98714ff02198c576bacdd792a6153fdaf6f9a7b52d8cfb6d09099a269d0c1b0d31e2ea5a307ea1db85115bdc6797887a6de36d597f6