Analysis
-
max time kernel
142s -
max time network
154s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
15-11-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
90d134fe452c1fa52076c9d9e23d115f08c279bc8c8ec32a192117578e71f79e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
90d134fe452c1fa52076c9d9e23d115f08c279bc8c8ec32a192117578e71f79e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
90d134fe452c1fa52076c9d9e23d115f08c279bc8c8ec32a192117578e71f79e.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
90d134fe452c1fa52076c9d9e23d115f08c279bc8c8ec32a192117578e71f79e.apk
-
Size
605KB
-
MD5
98d0d38d446ae7f4dfe59917d04b65f6
-
SHA1
ec1d8eeb42f26ab03216334c615de74447b8ea45
-
SHA256
90d134fe452c1fa52076c9d9e23d115f08c279bc8c8ec32a192117578e71f79e
-
SHA512
6e987bfdc119c5bd43b85d656918798a9dc61bd960f0641cdc6568b5eeb6165359a9b7fe5a343c7802fbd428ca7b84e9089e0dbc7a0c49caf1a26475a3b53c0b
-
SSDEEP
12288:OP0xl6DH6gM8semYIWU2pLjr2IBDfTgSSxf+QXeLmts4hDLrMhdIm3VKZ:OaoeB2IWxLjHBDTgS4+CAmtsIzgdIm3I
Malware Config
Extracted
octo
https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://34b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://64b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://74b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://894b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139030754567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139033074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b641553903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.completeremember8/code_cache/secondary-dexes/1731708029028_classes.dex 4578 com.completeremember8 /data/user/0/com.completeremember8/code_cache/secondary-dexes/1731708029028_classes.dex 4578 com.completeremember8 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.completeremember8 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.completeremember8 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.completeremember8 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.completeremember8 -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.completeremember8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.completeremember8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.completeremember8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.completeremember8 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.completeremember8 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.completeremember8 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.completeremember8 -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.completeremember8 -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.completeremember8 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.completeremember8
Processes
-
com.completeremember81⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4578
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
447KB
MD555a9581a83232f85c541fef828d52e31
SHA11d330262fe57e17c36ee15b5ef163db8a49a99e2
SHA256837428bf0546218256a320d7f751e9ac5695e3b3fc4c8d99d51a863ea28651df
SHA512d0131daf6c68b3be38b7aacd8401864584d546b72e7bd0bf327ed8984abaaa531cc0c78e4c1c6996d8a64943ef93a0ab5929a0b421939835af6d3fd38c7b7488
-
Filesize
1.1MB
MD5ffa252f7a4b4c98e5bc5e7e3575bfe64
SHA1b37a7297d75b296af758756f2afbc6bc15c96b39
SHA256c6152ff2121c749c50885129137c922470094c42d9d353eadf5ab8d1df574574
SHA512de50eaafb76e1900f2a31178037174f804113f80cf3dc01960b072d8543caa806d3d8786eb41ebf1812ee363a748eece03759539cbf6454b78f803c34f8e638f
-
Filesize
8B
MD53d4830708774e02fa4fa154025c88ab9
SHA135ebb1345eeeec99751c161dc00d851871fa2ae4
SHA2563ae9ba9cc11c1e96f0cb0d106899866f4e565cbf81a083b46c1568a7debc6124
SHA512baba5dc57f39b8fb9459256c7853dadb72259f53affd9f4ad2564f594a0f7d5f68e3f178eb2f5c9971b5af2ba968c1fc8acb37b2335307f9d845a93e69eb52ad
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5bf1dc65bc41f8e9bae6dc961826fce25
SHA1d580abda3cfd07f57c8fc828b61cf5c7a24959da
SHA2560e5bf3d7c6c8782c6f8b1a313189af85613d7104e8918d7945ab3092ce120a3e
SHA512fe01f30e5bef349b04875e39f09485e3a5aa68c020a0c5d2b0eb7a98f6665994ee57d44f429b67525ea085f326f6811fb53b740096b760dd58eb9862159ed418
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
169KB
MD50d5551d9ee982372c5428c644820f6be
SHA19e2ac07f20082e8cb902d1924f79fc9e19d5d440
SHA256173044e9a8a427574e14979e036aa5fc50249dc2c9c71b9dee179a9f6cb18ceb
SHA512307e820fd30112339f6c1cc7f9887d3374599d3b302eb77d19d4cd2967c9af0adaf94c8c155fdacd32b5f6506612c1afc2b95141a7ab05fb15cad769052a0ce5
-
Filesize
16KB
MD5b3602b6e261fbbd7c35bf779fa08bb2d
SHA1400aded788af8918b459341502aa2235bbcdc8b5
SHA256b638c2ebf6ccbc6331dd47d48eac0332c3b2094bb6dc18694895c98e3f4b82b8
SHA5124e002625f8e9d540991afcd3b9bff0d1edbb55a30f28b1c0be4e5faa4e418f3ed68164cd24bfb6bf081addf108e3ec7b05d7f75f91e236a2bed6bc578a038a17
-
Filesize
116KB
MD5e1d4d0388f6545ae4a45ebd9c938f4b6
SHA195eed43443e9cec31935f998b99b6e185897ae97
SHA256d97801ade53f5b77667d7487c15d52bd95c24452264b74709eed4336406734b0
SHA5127412a7032490abaa7ab29e896d22be1b9323ba6b5982abd21ee6f946458643f708da661b4a6396cd9bdfd18cc64f5187735dbb512f09d1d750999df93dc454dd
-
Filesize
112B
MD515af1cdcfaedb837b19131fdd2a1d2cf
SHA1cff26d94e13e265c921c6fd53a0453b4a1b6fa33
SHA25678588d2f38d110e0ded2a212ce0694301965b7b9c4981e9e373e2415c69a777b
SHA512462f65a932e0052f369311c997a9957d3350bf8784486cd4365381e15fa9550b7af5ee12ec5e5ad6dca27abe621d01c4ed4beaba62dabc16ebf332dfb990cbcf
-
Filesize
25B
MD5b9d9e0f8902d129e1aeebff0ae7b725b
SHA1cb0d2b4c9dd60a5c1fc6261fb581bcd3416fe781
SHA25625a822139d06016af8be1296c0242b60e35074f94c713e03323636be1162ce91
SHA512f158a9dc753e0cb41f71a98714ff02198c576bacdd792a6153fdaf6f9a7b52d8cfb6d09099a269d0c1b0d31e2ea5a307ea1db85115bdc6797887a6de36d597f6