Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    15-11-2024 22:03

General

  • Target

    4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de.apk

  • Size

    605KB

  • MD5

    52d376b16ea81906c20b6c8eac33019d

  • SHA1

    f31ddc22872fc4e9642ca8fce1b9be4d62d24233

  • SHA256

    4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de

  • SHA512

    57d0f44a6f7fc2ffd1b4bd1305a0d0bd1521401d9d21d6cd65ae80e2ffb67ebe8676f39c85b55a59b3c50181664068e40fe1b640f92364af210ef8187f379696

  • SSDEEP

    12288:CyKc0+BjazBkz9iP0Twew190mVgHl+NVEkals4hDLrMhdhT:CyK1+NaVkzcP0Trw1909H0jBalsIzgdd

Malware Config

Extracted

Family

octo

C2

https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/

https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/

https://34b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/

https://64b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/

https://74b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/

https://894b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/

https://94b64139030754567453981d0595033c23.com/YmZiMzU0OTU5NGIz/

https://94b64139033074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/

https://94b641553903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/

DES_key
AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.drawfarsym
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4317
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.drawfarsym/code_cache/secondary-dexes/1731708207155_classes.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.drawfarsym/code_cache/secondary-dexes/oat/x86/1731708207155_classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4342

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.drawfarsym/cache/classes.dex

    Filesize

    446KB

    MD5

    1a1a47e66116cf523207402412ba6c5a

    SHA1

    1908e7d762072261a4d06182b9434536fb7506ce

    SHA256

    2c907b6dda4c75fadcb2f104bc9b659a480372846402f36c1cc26c2c568b6882

    SHA512

    0e32e9d5f9644877d59416932143b8f48cc98e27ab5f0a7b1b7d5d95582ad9bc0ee7c31fb9cef72dc5f95dab73afd0715b0fe4274a0f2df2290da710d0a43f67

  • /data/data/com.drawfarsym/code_cache/secondary-dexes/1731708207155_classes.dex

    Filesize

    1.1MB

    MD5

    886f51647085722e7b6f112c0c2d6ced

    SHA1

    ea28019273cf4c51d37c613dceac3e1e2656e1a5

    SHA256

    02fbce2d24686a16c21b880c07af3357533e2e3ad361a21b1057f5511ae5fc9b

    SHA512

    b3204dc5fe2b5c06016d15764eea6903c1f7bd171987bedea89d9fc6689bc118054a76f2c1125ecf7fed86f9f472859d361169bb992e9f3b9d7c8c20bc7899c3

  • /data/data/com.drawfarsym/files/profileInstalled

    Filesize

    24B

    MD5

    a34a1bd56ee2a495e61dab5d0a3933f7

    SHA1

    1797a37588d746cad16d447b605d916cc0619e9c

    SHA256

    169e1e7ad8c6868086bf68b3c483f9fdfc5370056b71c67255fdb3c5e62b5369

    SHA512

    6b8951c7aae4fe69b8d5f623f5e4e1fa82ec58a021fd6b4f02c4ff4804299a1a52aa9ef0f02420bf0de97517aee6301b49b94af5647e019ac621c855feefd592

  • /data/data/com.drawfarsym/files/profileinstaller_profileWrittenFor_lastUpdateTime.dat

    Filesize

    8B

    MD5

    cec7c3e295aaff7cfdfde7839a0bf36d

    SHA1

    5cb62fa226192b07af9d31b1152050b6664c42e5

    SHA256

    339260ebb43ab177c280245f8bde14a91bdbcf0f164243c7935152ff3d4bb847

    SHA512

    98153ad800709f4b1392e0abc496fc992384a518dfb15b75912c688d80ade16ee7f4bf93bb0f7b9c3ea166a346159f29372c308a7ecc20255bb5911a9135122f

  • /data/data/com.drawfarsym/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.drawfarsym/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    f2417a0594c62fc46ff8d2989e3c4b34

    SHA1

    41b768e3d515294f3baa203aa801bc903af1aa52

    SHA256

    499262aaef881585213ef78299f3f7d49feb74ebc9ed40a2d0374e0a1027277a

    SHA512

    343e3e99b318492b7f84feda758477a150a256bff4fdcf8c01d87772fe148b9f48df2f87dc9a08461958270fd2132d990b1b1dd4985240900f6cb16a65c10875

  • /data/data/com.drawfarsym/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.drawfarsym/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    17583dc5df15bb9386da26d88b7071bd

    SHA1

    010be85bafa89c1fa42bcec9d1413c0c44c1c4e6

    SHA256

    44305fdecd08ecf3852581d822928e89394cee8da343b4f955b8303a434a4a6d

    SHA512

    f0a5e0bee2f8ccb953ca366fdbe6c2697c94fa4bb9cc4772ae137c4eee460984be31d887385dbe5cde8727ed7b39af29d3006b22c2f873f7e0fc6033e5eba3d2

  • /data/data/com.drawfarsym/no_backup/androidx.work.workdb-wal

    Filesize

    116KB

    MD5

    79d66f290f348d194c8d4046e61f7dc7

    SHA1

    7e6f49648403d0e4fb4936ef07c5f729a0014c0f

    SHA256

    7dfc11fa449882d4c81b4d23e56602f1128a4b8b84f25bc953e5eae494b11ba5

    SHA512

    97f66558d6fe590ecfa2e5e853a5d0233b2e6ed2b895cc6e0a74fb9b9d60f10dc8345017156b7c2d6a894e365ab898a239eb0bb2a53da0c8598933c2556f378d

  • /data/data/com.drawfarsym/no_backup/androidx.work.workdb-wal

    Filesize

    124KB

    MD5

    26e74051a9cdb90d10d0687a5459b64b

    SHA1

    093bdf025dc327f1e1d8bbecb66632b1a09328f4

    SHA256

    a933530873daea6f6b45b7459797c1c86280dd390d3fb094ef006078376f8e13

    SHA512

    91528eb741b4f4dc88e1a108d4b002b7b8a948a81ac16bd7591f974e78cf02227c0c8e0f0aec341229318e5d528e48ee34b0f0e5e6dbec7193fee8d70ae3c643

  • /data/data/com.drawfarsym/no_backup/androidx.work.workdb-wal

    Filesize

    177KB

    MD5

    018cf069d6b607ee5ac63dc22efc2092

    SHA1

    7cb66cae32031220f23fe56ffe85430641e51552

    SHA256

    394ed37d019031ea5bd092ffca011105f230877ec3a24ac2b3516fc9d4ba4785

    SHA512

    acb3c239fe0494f708835a92c73dd1cf539dc1b6212401235fbc4d4aeec41e3e68771703df85f7c6b8792cf722118fb8a1e24490796affb26d9d7afd8cd7d848

  • /data/misc/profiles/cur/0/com.drawfarsym/primary.prof

    Filesize

    111B

    MD5

    d08e6a6aca95d9e7c02d0c45fd981359

    SHA1

    7db0821f0b8c5de9c402228a9f6bdf38645462d1

    SHA256

    8c093f6c8881cc2a8acb167a072e07b6ec5f971a1cab5bde19ac2dfc5da28e2c

    SHA512

    574949c9a8324e2b6f9b90b9cd9c43cd149ba79522a46aefe0266f3e090719efd00cd6268e1a561e113a93dcbb7eb0f55f7fdee6170e44af85cc848d29cbd8a2

  • /data/misc/profiles/cur/0/com.drawfarsym/primary.prof

    Filesize

    121B

    MD5

    8bc7e7dab836805b923d6bd0dc63261c

    SHA1

    73b1c889d40bbf5dfef721efa02529e1ea86eb58

    SHA256

    89f6be57d7c24eb0343832c308addec3e6438760d54508783a8482916c54d096

    SHA512

    dfbd057496eb5c63ef0ae64b9751696acbc0104ab820d0ceda213f3c0fd58d690f62a68a2da18783753c0d283726c0efcb63cacd5ef3afa8767c8b1cefeb0bc4

  • /data/user/0/com.drawfarsym/code_cache/secondary-dexes/1731708207155_classes.dex

    Filesize

    1.1MB

    MD5

    8257522fd301cc5d5fb9fd6731fb858a

    SHA1

    ce821896a8f0ecf7ca39d0df67397fcf2870996f

    SHA256

    4b7e29b9662eea33305d0cc6e6538bb78c72ef017d7b7604b9e5d7795f930a34

    SHA512

    2a49f74be8c0ce716650096862990e5143f9bedc8e48e9534df2949672eabe6bbc62875e33e14d338312343ee2688b7d1a2f3c6e9730f599bd9e28b79b1f9930