Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    18-11-2024 22:07

General

  • Target

    7987b546e10977cdd204a02dd86cd9a0cb64014223f660d0d97ef76daa25e96e.apk

  • Size

    513KB

  • MD5

    23a3d4bdc7775a2ad0c117de609b60cb

  • SHA1

    398eba2212260848c0a144b590e000f793218074

  • SHA256

    7987b546e10977cdd204a02dd86cd9a0cb64014223f660d0d97ef76daa25e96e

  • SHA512

    cc6f69017e98c9f5fd4a2a5e47b4db1c06c3da479bf51c3dbb49a7939335fde0b0df61eaea11a478ae9ece0eadca13a441cc207e14462a13a9298e0ac3aff2da

  • SSDEEP

    12288:jch5rD6GaRGEEnXhGD81MMfrOT8nbDeSQyclovFEV4enkt:jcfD6GNhx2ZyOT8/3QycedEBnW

Malware Config

Extracted

Family

octo

C2

https://mutesksek3421.com/MzQ1Yzk1ZGQ4ODY3/

https://adyesksockcem3421.com/MzQ1Yzk1ZGQ4ODY3/

https://adnndlga23cm.com/MzQ1Yzk1ZGQ4ODY3/

https://ad23cmxd.com/MzQ1Yzk1ZGQ4ODY3/

https://adbniskseekske2.com/MzQ1Yzk1ZGQ4ODY3/

rc4.plain

Extracted

Family

octo

C2

https://mutesksek3421.com/MzQ1Yzk1ZGQ4ODY3/

https://adyesksockcem3421.com/MzQ1Yzk1ZGQ4ODY3/

https://adnndlga23cm.com/MzQ1Yzk1ZGQ4ODY3/

https://ad23cmxd.com/MzQ1Yzk1ZGQ4ODY3/

https://adbniskseekske2.com/MzQ1Yzk1ZGQ4ODY3/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.doneyearr
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4765

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.doneyearr/cache/oat/vsdriaizs.cur.prof

    Filesize

    307B

    MD5

    960437026385df2945c7e4e9542e0b99

    SHA1

    afb067525bcb62162cc82ab77af3e0e31c5b4a03

    SHA256

    3c9ef3759b653238036f72d192601af69f5af1e2db3e6f765e8b2150de9722d5

    SHA512

    2a8ae19739090e4f6759f7dda7717f6546c4703e8cd3c6e62822dc2dd4ad688d438bf0311276158db47949ddef8f86690fa93b29d114dc6ca3323d1a14ebd636

  • /data/data/com.doneyearr/cache/vsdriaizs

    Filesize

    448KB

    MD5

    930eeac38e5f2825a7290dd775fcf2ad

    SHA1

    c008ae7a9ba3e6c9b4c21e45cc5242e1d61dbcf6

    SHA256

    8dfb9e6abb7c3cc6f3db9fef1337f824774aba32955f49dd435e507387465ea6

    SHA512

    7857e925d6ba6a27df41559d2b683ab11ed2637ee8ad149f6b9b4d417152a474f59f2e037c071b6c8ee21e489f0a1385438b40250cae35d367021992ce09453a