Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
16-11-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e.apk
-
Size
605KB
-
MD5
d83218c0049033226231a192b536e1f3
-
SHA1
cfbe17b09fa323bac132338a59a1a034cb15de3f
-
SHA256
63827fb56cc23a2eeefde2406410954fbd38b86c059088db5ed00c864ce2345e
-
SHA512
b5c50567e72ef4760a3961b28c279481153ec46d65257aae91193b00bd01d05be5d6f3a2473d56185680e6b9681c6df01cd46bd7416c87d846ce89a6bc83a078
-
SSDEEP
12288:mgjPPegWzQaRv43wwuMrplcrZZacG/lm8fd1ls4hDLrMhdfP:rPExBZM+RG/l11lsIzgdfP
Malware Config
Extracted
octo
https://7bb13903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://4b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://34b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://64b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://74b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://894b6413903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139030754567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b64139033074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
https://94b641553903074567453981d0595033c23.com/YmZiMzU0OTU5NGIz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sideboy8/code_cache/secondary-dexes/1731794434172_classes.dex 4998 com.sideboy8 /data/user/0/com.sideboy8/code_cache/secondary-dexes/1731794434172_classes.dex 4998 com.sideboy8 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sideboy8 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sideboy8 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sideboy8 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sideboy8 -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sideboy8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sideboy8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sideboy8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sideboy8 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sideboy8 -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sideboy8 -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sideboy8 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sideboy8
Processes
-
com.sideboy81⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4998
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
447KB
MD5a77250d8b3eac77fd2dc34ad969df4e5
SHA104250daf8b41a4761aae25670f88f4fd499ce4c2
SHA2567aceb898c2732581fbbdecdc2fa701b28c7d90114611c1ca0d767fbe8281ff2b
SHA5127cdda80001952cfb15876de021cda2ed7db39fff2a4a07192158491d5a111559df06e4828ffd2fd42d9c44e21550ece3ae4570925098c409cc8034d94835dcc6
-
Filesize
1.1MB
MD5679f2fa79a5761fbf4ae231357150be9
SHA19b99eac87d521bc4d10282ededd94b2a54dcac08
SHA2569b3d13f8fc5e70640c53dd7be00ef55b7c4e8404bd47b3c135cf333e2026caae
SHA5122c09dc666bf8ad018a3d8819483f054940d20cbb13d2c5da0ce6744f1e403369b89bb3f55610da9e077448065d8a6c0fd5c16834bbed546a6f94e2f238fb5c6c
-
Filesize
24B
MD5b457133150f8286ca476ba376590d14c
SHA15c9531f2429a882557e897d5192bfce69a9cdd4d
SHA25631e607018ce853d2aff5d8b7b52af534bc22633942939fb2f28083bbde26a6d2
SHA51224f76ad8361372937260ed996feeb50b48e5b8407b535d832ff2325ce105f0c1912cd63635815132a47e1884a3222bac6ae8e0429f1e7e71aa26cd5ab8aa7478
-
Filesize
8B
MD567e6c18c82ceeec703600c3564bf22c0
SHA165eaaac9bc8b7edbad92a948ae0f4e359a1d1236
SHA256e92798b1bc70c844ff56fe28f9ac36f6949969840a925c2e11d774cf721b69c8
SHA5122233a1b21a7615b350c649f1c2528d382bfee011ac4bf37eef56743d7d69bc1107ef4dcdbe51e682a43e5294bce7a3549f02d49889c7d81be2cc5c2e97a9fad9
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5512e2123dad318cf6abaf2d164882420
SHA1e98207a00a064791a0fa06afc7c16e0e9cd9b204
SHA2561aa7a0082b89e4b65e0c8fa9725abae32a13befdc3f7bc515bf291e27e3ce687
SHA51220cd30bd2cc86e332f2f1afcda9b3147a7b0749150cec6514c70c343e52287c61138c6a39fc5e3b817943b7c332b672c791ed377837291358833067d348f573f
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
124KB
MD528cf154ab7cd90f265dc636b2c6d40fc
SHA18dee611c169d37b600ed3f04b957eae63ec5037f
SHA2569006d70a214adefe9f6bfcfbafc3ec242399ddb44cf1496350a7e25fb115b6eb
SHA51291508f96608ef559158cedd8ea73ceac891844324a86910bc12bf68d3f1f135e66087ce886f39db04ddd578d2174d6b6df7748c502cb6daad100ced07b6b5b49
-
Filesize
177KB
MD56c605b3d8a379ffd2bb4f8ea6cfb2059
SHA1d4c163122d619e6e56dc93030a040177fbe27558
SHA256c6941c2f93eb6f2ba6bfadb324633045278483d1f1a88c084384db478953cd90
SHA5123e9b47159aa15749259484540dc6732d2bfd9cbeb78894cf2b7f2bbc81afdfec4a718a6249bfce839b2f189fab5d684389230341c3cfd1c15458b858be39fcde
-
Filesize
16KB
MD55af9771fcda510b0b8d27267f8175d4c
SHA16ac09ba9286790bfcfb5c0817339a436eefbdfbf
SHA25659508a618db7a09476fcd7b558ba5b537ef17f0dbd5e0e9e914a1f5d0dfc3c2f
SHA5122edbbdb3d02d000f9d749c7e84161584400d35c7883259f4870656723488f7abe38487a03f282351e70b4470a7188b451554b7ebca6a32231f530d404c530f70
-
Filesize
116KB
MD5f7bf9543c7ee2f762726547d5e45b748
SHA151ac7102c07508de13eca26d8204f8b22075ba84
SHA2568599bcfd5c8b9213dd1aee618168e5efccec800951cfb1a4388ef24cbaf7d99e
SHA5122c4e498f7194b296c9376c267147803ba328b808c88f6a0afad80ce9c19e30c0d91680b740bd9d243967469826136f16400c6a32f2fd066d23c0a212046fc9d3
-
Filesize
112B
MD51dcb9cc8247c525b14476fe296c471c1
SHA1ad775c91c2ece7619bc8c22c29b87b051d332cdf
SHA256353a4a5c06e1dab6fae6b469e51ff0091422ad1f71ed5bc2c443c597398f0963
SHA51243da245faf70631f487dc412cdf57755809301c14b7c6d68a9845d433b2f1a606a1f687051fdf34389bbffca32ce86a4fb784f4f050a3fadd668508e79585a9f
-
Filesize
25B
MD5b9d9e0f8902d129e1aeebff0ae7b725b
SHA1cb0d2b4c9dd60a5c1fc6261fb581bcd3416fe781
SHA25625a822139d06016af8be1296c0242b60e35074f94c713e03323636be1162ce91
SHA512f158a9dc753e0cb41f71a98714ff02198c576bacdd792a6153fdaf6f9a7b52d8cfb6d09099a269d0c1b0d31e2ea5a307ea1db85115bdc6797887a6de36d597f6