Analysis
-
max time kernel
149s -
max time network
155s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
17-11-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
3797a11be0590ab2a5420501672263d784f7019bd9aae7d3c15931e21af0225c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
3797a11be0590ab2a5420501672263d784f7019bd9aae7d3c15931e21af0225c.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
3797a11be0590ab2a5420501672263d784f7019bd9aae7d3c15931e21af0225c.apk
-
Size
1.7MB
-
MD5
9a3b89f2fa21e9e581bbc49b8766e7c4
-
SHA1
1e8bd4848aa90a780371f35fb4c01d1a290310b6
-
SHA256
3797a11be0590ab2a5420501672263d784f7019bd9aae7d3c15931e21af0225c
-
SHA512
a01846e7089dd8d08714d04a5a176af171617dd8456c52327743def9ba6649de2241f63ba93547231190fc9c2a86af84508a436ed6c1698933063de8dd23414b
-
SSDEEP
49152:U50wLqOv/TkCmkAIwfQAatbQ0DXs93gwbd:45L9ZmXH8DX6d
Malware Config
Extracted
octo
https://barabara2e1.me/ZWU1ZTRhMzU1Zjdi/
Extracted
octo
https://barabara2e1.me/ZWU1ZTRhMzU1Zjdi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.mandirect9/cache/luzqxznfsghfql family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mandirect9ioc pid process /data/user/0/com.mandirect9/cache/luzqxznfsghfql 4777 com.mandirect9 /data/user/0/com.mandirect9/cache/luzqxznfsghfql 4777 com.mandirect9 -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.mandirect9description ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mandirect9 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.mandirect9description ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mandirect9 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.mandirect9description ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.mandirect9 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.mandirect9description ioc process Framework service call android.app.IActivityManager.setServiceForeground com.mandirect9 -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.mandirect9ioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mandirect9 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mandirect9 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mandirect9 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mandirect9 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.mandirect9description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mandirect9 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.mandirect9description ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.mandirect9 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.mandirect9description ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.mandirect9 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.mandirect9description ioc process Framework API call javax.crypto.Cipher.doFinal com.mandirect9 -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.mandirect9description ioc process File opened for read /proc/cpuinfo com.mandirect9 -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.mandirect9description ioc process File opened for read /proc/meminfo com.mandirect9
Processes
-
com.mandirect91⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4777
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
461KB
MD51ea273a651ffc79827c35ee2387b55d4
SHA141ef6c8c89d8579199d8013e51426a79c98a2c1d
SHA25644d58061eb00b2f08cd8b5484f9a0417b68b9c1b5b7af094ca4f3a76fe24f51e
SHA512afa8e0ee596e81722be821dd1de35a9963be201a7c84736b7a21fe12466b4d96bced23d4d6e0bab259ad8bba33b3c6e59ee7cb24e3c843e68fd1b6bb0903282c
-
Filesize
351B
MD55c909bbaf3bbc8c2065ffb56313d4292
SHA1cd98687cc01d19e3ecd333e538a426294273e33c
SHA25642e76dbe0ad569df28a8b3f6dc267ee96b5d3b550bc16fb3cf0b876ba28570d0
SHA5127fa4671a4cfec90f745c380999742954e89e1b270dfb57e970d8edb6511c130d693e04d91a5f7c004e556758212aad78fdc6c6a1b7c53a4a1df9203ee95c2e46
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
73B
MD58035ef02d4fdd0ffc59fa24ba9bbc6fd
SHA1b0a7467748023366e205496223f3199d528bc11c
SHA256d98c91da2492b84cc25384d6b1afe99ea2b5df7b839ad6dbed599e01af8ac6d2
SHA5124f8479821c499585528ad1fe7e8f573754210fe7a4f05db8c02d6f7d75db2cc33fa00b1e41793099fbc1c9d3c63719eb1126dfe637ad32b370c20dc6eeaa9615
-
Filesize
237B
MD5328d45d4d06d085f90534acd9e6577d7
SHA10680d949d13d236135b08140000934f191974255
SHA256974cb0839be239a8fd77e175f1052760b92598a2d0822720079bbf07713ec9f2
SHA512c90734395a007fee740a4f61731778fe514cb3c6ef8204af4305db102f85d21ad89e1099335c935324fae49e2a81adf7909cbd36b0ba50f082e887fab32c84c9
-
Filesize
45B
MD574e6cd3f25bf28b45a5128427faad739
SHA1cc0254e3f1dffce58e4b6f6d4f10e0ca8d75d69a
SHA2561cce430f660940d180007681b178a76df90aa77991363863846bf5690c820a2e
SHA512325cad73b7eaa19fa82c2decbe670b3e936d988128632f8bea07a854dfca9df7eeb7f1eebe49a411bfc97020670e2358341a4b9c3fad61f5b85f69538263ad27
-
Filesize
75B
MD5f44baf1e05b5624c90ed34cedbfefdb0
SHA10752aa7b76297c12e0870bda848f6409b708633a
SHA256a5a7f5665d824356eae504323e528a2ce97d1c3b55f4dce8ffe648e7b7096e5b
SHA51229cfb33e1cf1897d5645e36c80c271fe0fb9544bc758262e72309ae0534c01c8d29d04ea1b20aa61daf84ef183a87255a1bd2fe6c54b14fa62021ab0864a1c35