Analysis
-
max time kernel
140s -
max time network
158s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
15-11-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de.apk
-
Size
605KB
-
MD5
52d376b16ea81906c20b6c8eac33019d
-
SHA1
f31ddc22872fc4e9642ca8fce1b9be4d62d24233
-
SHA256
4f39e86fb8f39acbd92f15da4a3b4eb622b52493e5d4e6d7c396eea68bebb2de
-
SHA512
57d0f44a6f7fc2ffd1b4bd1305a0d0bd1521401d9d21d6cd65ae80e2ffb67ebe8676f39c85b55a59b3c50181664068e40fe1b640f92364af210ef8187f379696
-
SSDEEP
12288:CyKc0+BjazBkz9iP0Twew190mVgHl+NVEkals4hDLrMhdhT:CyK1+NaVkzcP0Trw1909H0jBalsIzgdd
Malware Config
Extracted
octo
https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://34b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://64b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://74b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://894b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139030754567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139033074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b641553903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.drawfarsym/code_cache/secondary-dexes/1731708207729_classes.dex 4464 com.drawfarsym /data/user/0/com.drawfarsym/code_cache/secondary-dexes/1731708207729_classes.dex 4464 com.drawfarsym -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.drawfarsym Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.drawfarsym -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.drawfarsym -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.drawfarsym -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.drawfarsym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.drawfarsym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.drawfarsym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.drawfarsym -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.drawfarsym -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.drawfarsym -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.drawfarsym -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.drawfarsym -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.drawfarsym -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.drawfarsym
Processes
-
com.drawfarsym1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4464
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD51a1a47e66116cf523207402412ba6c5a
SHA11908e7d762072261a4d06182b9434536fb7506ce
SHA2562c907b6dda4c75fadcb2f104bc9b659a480372846402f36c1cc26c2c568b6882
SHA5120e32e9d5f9644877d59416932143b8f48cc98e27ab5f0a7b1b7d5d95582ad9bc0ee7c31fb9cef72dc5f95dab73afd0715b0fe4274a0f2df2290da710d0a43f67
-
Filesize
1.1MB
MD5886f51647085722e7b6f112c0c2d6ced
SHA1ea28019273cf4c51d37c613dceac3e1e2656e1a5
SHA25602fbce2d24686a16c21b880c07af3357533e2e3ad361a21b1057f5511ae5fc9b
SHA512b3204dc5fe2b5c06016d15764eea6903c1f7bd171987bedea89d9fc6689bc118054a76f2c1125ecf7fed86f9f472859d361169bb992e9f3b9d7c8c20bc7899c3
-
Filesize
8B
MD560a14367e676971f12a5fe8a3b138e90
SHA1c6f94e1c57912f7e5e0b6e0ddc03578ba74a62b1
SHA256c10a2eeac7acb1b2785cf277089996baca9a13611de10feca6b91f87a9e273ae
SHA51260df97d8e62d9a2871f19cf33dad97bb84ea28f41c8ef57aa0408e0bc0120dfd333e4476d4edfcc0db20179ffbd76e21bc72e6a5acd07e2d8c10658079ea69a0
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5bc3a469811f3eb6f1fb68427d8a6e77c
SHA15ef1f5d9300607b9ed587272e3d7d99c076a1122
SHA25687ed2cadc51ffc0616945e9936590b0b047c94a31fbabf5271ca8e1724db569f
SHA512230bdf625d7938fda41753af43b9e06e8542bd2b82d5cfcd3f1ad6a729cc9983afb0a12a7d82c6b5f5df10d8747c31ce33d76fabe95a429546e1fdd4e2d94f62
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
169KB
MD5baf084bb2d21ebbf659b0b6ecc75ce46
SHA139a31b7a75bf68166eee9ed2d1687611f4689507
SHA2565da2ee3b863516fc1b6622d9ccc7796e65ec35069a25ace412ab327245f713c4
SHA512f34747d4989bbbf35af79cd4c6df0c7dde73d62fd5a87d7eb6213e96cbe45692b9859238e11607a49b3ff302670ba05e47ac7a17314645e18dfa2bffad7a4218
-
Filesize
16KB
MD592dcc773c5f90af05ce0384c027deed5
SHA1a0552e49059df1469747201beebd2852987b7131
SHA256aa3503b8a4939658f7de5fc2905f3671aecddfe733bcd7995d52a4c9e548c79f
SHA51270172d83bcfaabc0d161592ff2f34b2ec6e6200f6749346a7e2ba3e7db4122a41e875c7cdcad5bdd4a18eb5a52b2a87770d87147821af88bd39a95ea19d5417c
-
Filesize
116KB
MD523429e42c7e1f4af7fc298f954e1852e
SHA179525318a6da54014f2f9b8252c93d65a178bc09
SHA256ac020292c5b3dee722912300327e7c6cbafce5f2895d818ba343e670df102187
SHA5126e2c12e1eb956492a6bb78e476594b9fe2e0311fed45aa50a16038e3ac792747c8e42414eaaf0ef2fe69421b9e34f12b241cbb5218c50c176f17ec46b7f22b4d
-
Filesize
111B
MD5d08e6a6aca95d9e7c02d0c45fd981359
SHA17db0821f0b8c5de9c402228a9f6bdf38645462d1
SHA2568c093f6c8881cc2a8acb167a072e07b6ec5f971a1cab5bde19ac2dfc5da28e2c
SHA512574949c9a8324e2b6f9b90b9cd9c43cd149ba79522a46aefe0266f3e090719efd00cd6268e1a561e113a93dcbb7eb0f55f7fdee6170e44af85cc848d29cbd8a2
-
Filesize
25B
MD5b9d9e0f8902d129e1aeebff0ae7b725b
SHA1cb0d2b4c9dd60a5c1fc6261fb581bcd3416fe781
SHA25625a822139d06016af8be1296c0242b60e35074f94c713e03323636be1162ce91
SHA512f158a9dc753e0cb41f71a98714ff02198c576bacdd792a6153fdaf6f9a7b52d8cfb6d09099a269d0c1b0d31e2ea5a307ea1db85115bdc6797887a6de36d597f6