Analysis
-
max time kernel
147s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
15-11-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de.apk
-
Size
605KB
-
MD5
52d376b16ea81906c20b6c8eac33019d
-
SHA1
f31ddc22872fc4e9642ca8fce1b9be4d62d24233
-
SHA256
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de
-
SHA512
57d0f44a6f7fc2ffd1b4bd1305a0d0bd1521401d9d21d6cd65ae80e2ffb67ebe8676f39c85b55a59b3c50181664068e40fe1b640f92364af210ef8187f379696
-
SSDEEP
12288:CyKc0+BjazBkz9iP0Twew190mVgHl+NVEkals4hDLrMhdhT:CyK1+NaVkzcP0Trw1909H0jBalsIzgdd
Malware Config
Extracted
octo
https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://34b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://64b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://74b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://894b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139030754567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139033074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b641553903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 2 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_octo behavioral1/memory/4317-1.dex family_octo -
pid Process 4317 com.drawfarsym -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.drawfarsym/code_cache/secondary-dexes/1731708207155_classes.dex 4317 com.drawfarsym /data/user/0/com.drawfarsym/code_cache/secondary-dexes/1731708207155_classes.dex 4342 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.drawfarsym/code_cache/secondary-dexes/1731708207155_classes.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.drawfarsym/code_cache/secondary-dexes/oat/x86/1731708207155_classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.drawfarsym/code_cache/secondary-dexes/1731708207155_classes.dex 4317 com.drawfarsym -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.drawfarsym Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.drawfarsym -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.drawfarsym -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.drawfarsym -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.drawfarsym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.drawfarsym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.drawfarsym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.drawfarsym -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.drawfarsym -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.drawfarsym -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.drawfarsym -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.drawfarsym -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.drawfarsym -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.drawfarsym -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.drawfarsym
Processes
-
com.drawfarsym1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4317 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.drawfarsym/code_cache/secondary-dexes/1731708207155_classes.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.drawfarsym/code_cache/secondary-dexes/oat/x86/1731708207155_classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4342
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD51a1a47e66116cf523207402412ba6c5a
SHA11908e7d762072261a4d06182b9434536fb7506ce
SHA2562c907b6dda4c75fadcb2f104bc9b659a480372846402f36c1cc26c2c568b6882
SHA5120e32e9d5f9644877d59416932143b8f48cc98e27ab5f0a7b1b7d5d95582ad9bc0ee7c31fb9cef72dc5f95dab73afd0715b0fe4274a0f2df2290da710d0a43f67
-
Filesize
1.1MB
MD5886f51647085722e7b6f112c0c2d6ced
SHA1ea28019273cf4c51d37c613dceac3e1e2656e1a5
SHA25602fbce2d24686a16c21b880c07af3357533e2e3ad361a21b1057f5511ae5fc9b
SHA512b3204dc5fe2b5c06016d15764eea6903c1f7bd171987bedea89d9fc6689bc118054a76f2c1125ecf7fed86f9f472859d361169bb992e9f3b9d7c8c20bc7899c3
-
Filesize
24B
MD5a34a1bd56ee2a495e61dab5d0a3933f7
SHA11797a37588d746cad16d447b605d916cc0619e9c
SHA256169e1e7ad8c6868086bf68b3c483f9fdfc5370056b71c67255fdb3c5e62b5369
SHA5126b8951c7aae4fe69b8d5f623f5e4e1fa82ec58a021fd6b4f02c4ff4804299a1a52aa9ef0f02420bf0de97517aee6301b49b94af5647e019ac621c855feefd592
-
Filesize
8B
MD5cec7c3e295aaff7cfdfde7839a0bf36d
SHA15cb62fa226192b07af9d31b1152050b6664c42e5
SHA256339260ebb43ab177c280245f8bde14a91bdbcf0f164243c7935152ff3d4bb847
SHA51298153ad800709f4b1392e0abc496fc992384a518dfb15b75912c688d80ade16ee7f4bf93bb0f7b9c3ea166a346159f29372c308a7ecc20255bb5911a9135122f
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5f2417a0594c62fc46ff8d2989e3c4b34
SHA141b768e3d515294f3baa203aa801bc903af1aa52
SHA256499262aaef881585213ef78299f3f7d49feb74ebc9ed40a2d0374e0a1027277a
SHA512343e3e99b318492b7f84feda758477a150a256bff4fdcf8c01d87772fe148b9f48df2f87dc9a08461958270fd2132d990b1b1dd4985240900f6cb16a65c10875
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD517583dc5df15bb9386da26d88b7071bd
SHA1010be85bafa89c1fa42bcec9d1413c0c44c1c4e6
SHA25644305fdecd08ecf3852581d822928e89394cee8da343b4f955b8303a434a4a6d
SHA512f0a5e0bee2f8ccb953ca366fdbe6c2697c94fa4bb9cc4772ae137c4eee460984be31d887385dbe5cde8727ed7b39af29d3006b22c2f873f7e0fc6033e5eba3d2
-
Filesize
116KB
MD579d66f290f348d194c8d4046e61f7dc7
SHA17e6f49648403d0e4fb4936ef07c5f729a0014c0f
SHA2567dfc11fa449882d4c81b4d23e56602f1128a4b8b84f25bc953e5eae494b11ba5
SHA51297f66558d6fe590ecfa2e5e853a5d0233b2e6ed2b895cc6e0a74fb9b9d60f10dc8345017156b7c2d6a894e365ab898a239eb0bb2a53da0c8598933c2556f378d
-
Filesize
124KB
MD526e74051a9cdb90d10d0687a5459b64b
SHA1093bdf025dc327f1e1d8bbecb66632b1a09328f4
SHA256a933530873daea6f6b45b7459797c1c86280dd390d3fb094ef006078376f8e13
SHA51291528eb741b4f4dc88e1a108d4b002b7b8a948a81ac16bd7591f974e78cf02227c0c8e0f0aec341229318e5d528e48ee34b0f0e5e6dbec7193fee8d70ae3c643
-
Filesize
177KB
MD5018cf069d6b607ee5ac63dc22efc2092
SHA17cb66cae32031220f23fe56ffe85430641e51552
SHA256394ed37d019031ea5bd092ffca011105f230877ec3a24ac2b3516fc9d4ba4785
SHA512acb3c239fe0494f708835a92c73dd1cf539dc1b6212401235fbc4d4aeec41e3e68771703df85f7c6b8792cf722118fb8a1e24490796affb26d9d7afd8cd7d848
-
Filesize
111B
MD5d08e6a6aca95d9e7c02d0c45fd981359
SHA17db0821f0b8c5de9c402228a9f6bdf38645462d1
SHA2568c093f6c8881cc2a8acb167a072e07b6ec5f971a1cab5bde19ac2dfc5da28e2c
SHA512574949c9a8324e2b6f9b90b9cd9c43cd149ba79522a46aefe0266f3e090719efd00cd6268e1a561e113a93dcbb7eb0f55f7fdee6170e44af85cc848d29cbd8a2
-
Filesize
121B
MD58bc7e7dab836805b923d6bd0dc63261c
SHA173b1c889d40bbf5dfef721efa02529e1ea86eb58
SHA25689f6be57d7c24eb0343832c308addec3e6438760d54508783a8482916c54d096
SHA512dfbd057496eb5c63ef0ae64b9751696acbc0104ab820d0ceda213f3c0fd58d690f62a68a2da18783753c0d283726c0efcb63cacd5ef3afa8767c8b1cefeb0bc4
-
Filesize
1.1MB
MD58257522fd301cc5d5fb9fd6731fb858a
SHA1ce821896a8f0ecf7ca39d0df67397fcf2870996f
SHA2564b7e29b9662eea33305d0cc6e6538bb78c72ef017d7b7604b9e5d7795f930a34
SHA5122a49f74be8c0ce716650096862990e5143f9bedc8e48e9534df2949672eabe6bbc62875e33e14d338312343ee2688b7d1a2f3c6e9730f599bd9e28b79b1f9930