Analysis
-
max time kernel
146s -
max time network
154s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
16-11-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e.apk
-
Size
605KB
-
MD5
d83218c0049033226231a192b536e1f3
-
SHA1
cfbe17b09fa323bac132338a59a1a034cb15de3f
-
SHA256
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e
-
SHA512
b5c50567e72ef4760a3961b28c279481153ec46d65257aae91193b00bd01d05be5d6f3a2473d56185680e6b9681c6df01cd46bd7416c87d846ce89a6bc83a078
-
SSDEEP
12288:mgjPPegWzQaRv43wwuMrplcrZZacG/lm8fd1ls4hDLrMhdfP:rPExBZM+RG/l11lsIzgdfP
Malware Config
Extracted
octo
https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://34b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://64b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://74b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://894b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139030754567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139033074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b641553903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 2 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_octo behavioral1/memory/4213-1.dex family_octo -
pid Process 4213 com.sideboy8 -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sideboy8/code_cache/secondary-dexes/1731794434640_classes.dex 4213 com.sideboy8 /data/user/0/com.sideboy8/code_cache/secondary-dexes/1731794434640_classes.dex 4238 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sideboy8/code_cache/secondary-dexes/1731794434640_classes.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.sideboy8/code_cache/secondary-dexes/oat/x86/1731794434640_classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.sideboy8/code_cache/secondary-dexes/1731794434640_classes.dex 4213 com.sideboy8 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sideboy8 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sideboy8 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sideboy8 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sideboy8 -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sideboy8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sideboy8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sideboy8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sideboy8 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sideboy8 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.sideboy8 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.sideboy8 -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.sideboy8 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sideboy8 -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sideboy8 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sideboy8
Processes
-
com.sideboy81⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4213 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sideboy8/code_cache/secondary-dexes/1731794434640_classes.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.sideboy8/code_cache/secondary-dexes/oat/x86/1731794434640_classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4238
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
447KB
MD5a77250d8b3eac77fd2dc34ad969df4e5
SHA104250daf8b41a4761aae25670f88f4fd499ce4c2
SHA2567aceb898c2732581fbbdecdc2fa701b28c7d90114611c1ca0d767fbe8281ff2b
SHA5127cdda80001952cfb15876de021cda2ed7db39fff2a4a07192158491d5a111559df06e4828ffd2fd42d9c44e21550ece3ae4570925098c409cc8034d94835dcc6
-
Filesize
1.1MB
MD5679f2fa79a5761fbf4ae231357150be9
SHA19b99eac87d521bc4d10282ededd94b2a54dcac08
SHA2569b3d13f8fc5e70640c53dd7be00ef55b7c4e8404bd47b3c135cf333e2026caae
SHA5122c09dc666bf8ad018a3d8819483f054940d20cbb13d2c5da0ce6744f1e403369b89bb3f55610da9e077448065d8a6c0fd5c16834bbed546a6f94e2f238fb5c6c
-
Filesize
24B
MD5d7ff69de82a9c02f7fda4565e8831923
SHA1de3fcd07e6d4497503389cfbc90d8d197a1036d5
SHA256c5cad40dc5b79670f0a5ba11d87e799a76859e2b9908dad66329c3733ff24d38
SHA512604c79ca989bb2ef2750536ff537626e6c21b146539d0d6a0f226638a0a1e49126baedf45085aa4efb2769c2b602d51284675988eacba686aeb341d5c42ce8fd
-
Filesize
8B
MD56b45c05585992c846a06bab3aad0fa68
SHA1141fdc0bc596b8d68da2757a114eef065195a7e1
SHA256d71a8bd4c936cc37c92c3502e006e93f7955f274842de0c8976d0292ffa070e0
SHA512dfb8448c6c68ad8552917183753a89ad855aa1ac2b0fce170b0a30248c5751b7bbd1268ea39b830a6f90118c586da014496538554c09756c304ca6740771c926
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD57438d5f9d80270e1ecaddcf003ea6bf5
SHA1b26cd41841929bab416182b444b7c7f4e18f9caf
SHA256ed5b173d586420650c6f636ce9831db70660ad0d9bea47298f344b6ced47127d
SHA512bec6562670ead1c0701109c6d21e088871dd6fd555fdcd99ff5b7d002fd8ee7f2bb5d741dc111beca9c0027ee0ba645f206d3cab9de2f2e9d3cfc425650f9a98
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD579c2ee2a1f17f4277feb7e0c2099b7ab
SHA1ca0d1444ae491c902cf233b7a9f328132bd59e27
SHA256e1ca5213bb036bdb37a64495b7c906736c963a848714206b81d14db4c9aa6eca
SHA5127daf2ea93c0937484ef9f8b8f00db108b2afed1adc30a66be42d6d2effeaf7cf27325081247ddc4fc27362345dcef6c4474d3b82ae9cddacf80abc46b6bde752
-
Filesize
116KB
MD58d71ad533f5deb327fabe072d439079b
SHA179a319c885c6861644827b4347106014af1f667b
SHA256658e2bf39066473555d55baea1eade59deb21cb536813e18556826dd16d06c11
SHA51244d07ada36450beeda2d82c6897b0aa63fb1e8d52891c022f4119f7f70fd412238facde4b82e6f00aea7663c27ade9a3e4ba474e4f0ffcc89762cf65339ea11c
-
Filesize
124KB
MD5e252e72bf7e561597713702fe59c3be8
SHA15087bd79ef290bfdae7599c59c2a5ebdb09ff4fc
SHA25674813ed89cdd931b41efaddee0a70834521888da5f9a8581377e46966f960b36
SHA5127c91c4cefe6e6071b40644cd9298ac6afd70849f17e25c99df57bf04b14809f881e0a049fc8eefbd4e3a220ae4965ed30c770658978986a9776b31202702db2a
-
Filesize
177KB
MD5a5e5f2e37cb535a1d6f358610db816a3
SHA186b8e6d7a12bcccdc12ecd83708e6c736c839f1e
SHA256392848f57234106c205da3ff170ba5bd901701c9a24a71c61c807b15d8b99abd
SHA512e326ca5ccb92f1a6f83245ca679d404928cd476e47b496d6fb856fbd4102348b81ace05db0afb2d2a700b58a707114eccc0f513854c3327ccd9778678330a319
-
Filesize
112B
MD51dcb9cc8247c525b14476fe296c471c1
SHA1ad775c91c2ece7619bc8c22c29b87b051d332cdf
SHA256353a4a5c06e1dab6fae6b469e51ff0091422ad1f71ed5bc2c443c597398f0963
SHA51243da245faf70631f487dc412cdf57755809301c14b7c6d68a9845d433b2f1a606a1f687051fdf34389bbffca32ce86a4fb784f4f050a3fadd668508e79585a9f
-
Filesize
120B
MD5ac14fb31b762399b86a2de0409e46693
SHA14023f10b97eb05499258686bf43cdf99c754cc00
SHA2563cc8142dfe44a1506dd222a14eae54330b5f29938cfefbf6ef19e6b93219ae1a
SHA5125080549c80468f4d21bc11468228b1653fb12a66500f800cbca35f39d10d958a75899cbeae79cc1a1415b7f2ddf3a7e9d8c6a337dc4f55681b64d9e8a704d3a6
-
Filesize
1.1MB
MD597cd314b2b5b0936651a378cfeb87cec
SHA1c1368bf370b977115df06ad4f12c34f3699943aa
SHA25617016320ac85cae367e6b23baac1dc265a1262e1f89b8e0d6c20615a44af904e
SHA51281dcc60dae58163405ef8efb1d9ce39eeb9669255dab81ad9ddf5cbbf3350ee3cee7a7eca1c961ccb60a730296a9d8694d48d1ee446ae04dfaaa8204d64ef043