Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    18-11-2024 22:06

General

  • Target

    2f0aa32c38e9f003006134daec95065e57051ccb0dd94cc9aa49d9f800a702b0.apk

  • Size

    541KB

  • MD5

    17ae964fc20b463648c46cc61570f60e

  • SHA1

    d27fe181daa9683613fa89b973ac1a904b0efca5

  • SHA256

    2f0aa32c38e9f003006134daec95065e57051ccb0dd94cc9aa49d9f800a702b0

  • SHA512

    3bc57adbb0b444c59d67ee6649b139a06236114d648040696e8ed6934eefb6a81dc7cca070a060e2bcc152c069cefc00ecd526973d99dc97528d43467c4b3b30

  • SSDEEP

    12288:MKDsIxOjGGix9nPk3GudqVTOIDwwBAAMOGchL+ImI:1nOBjdnIbBBFjJJ

Malware Config

Extracted

Family

octo

C2

https://176.111.174.92/ZTIyNTVmMmE1NzNl/

https://12logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://13logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://14logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://15logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://16logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://17logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://18logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://19logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://20logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://21logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://22logites432532s.xyz/ZTIyNTVmMmE1NzNl/

rc4.plain

Extracted

Family

octo

C2

https://176.111.174.92/ZTIyNTVmMmE1NzNl/

https://12logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://13logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://14logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://15logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://16logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://17logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://18logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://19logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://20logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://21logites432532s.xyz/ZTIyNTVmMmE1NzNl/

https://22logites432532s.xyz/ZTIyNTVmMmE1NzNl/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.facemore72
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4922

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.facemore72/cache/hdqdrvwhvz

    Filesize

    450KB

    MD5

    bd29a237b7c72b7b67623cfbf581a64a

    SHA1

    c202e95116e1f7a60a1552880a4f67b21249af33

    SHA256

    865a5e46602897d6988f2d08a8a3d5252120de44677695e3753a195bc37d43f7

    SHA512

    f608edce40ab4303059ed7b4a7b601df6c74e28ad6d368b240a9605daf6fc7d71f0daed3fe656ff264de293f3bbd7458b9a32b6b489a5d317f51e0326be9ac1a

  • /data/data/com.facemore72/cache/oat/hdqdrvwhvz.cur.prof

    Filesize

    455B

    MD5

    5674fc47cc4feb64345e343c89bc5d0f

    SHA1

    7ab9448f126c65d2f1ddd0a65ccdf831213d84be

    SHA256

    856bcbf94f05293d35965577992841a5165196b5f82b5cfd4a0198abd799b043

    SHA512

    53800de15c45bf4992dc87e2e79797cfc53fa72e6b5fbc781adf1da4077e7c33cb13bc32899e73ad89e0539ddf38dac12116b1601c0220b1a2a73e1212be46db

  • /data/data/com.facemore72/kl.txt

    Filesize

    28B

    MD5

    6311c3fd15588bb5c126e6c28ff5fffe

    SHA1

    ce81d136fce31779f4dd62e20bdaf99c91e2fc57

    SHA256

    8b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8

    SHA512

    2975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6

  • /data/data/com.facemore72/kl.txt

    Filesize

    68B

    MD5

    f6d52e469c55c36e14ed171e49768a72

    SHA1

    36e351b9ffc2445c9e3a728a1fa942e821f1723a

    SHA256

    a33c8ebc6df1672105d10e19fec64177d8b415893d3422acdd0248ea7e50e422

    SHA512

    70ad9b01b8a5a8e75da8d258f170dc4140a25b8e4598c9e907fc1b47f7bbcc3da75b88de59935b1685721ebc0a9dea29602f70178550612380c20ef2b1fad015

  • /data/data/com.facemore72/kl.txt

    Filesize

    76B

    MD5

    6fbd40f65ae195ae36507eb4390a59c4

    SHA1

    7aa0e23e4d768b16ec66e9ae377243b59034c46f

    SHA256

    28cdd071d786bde93672ab72811546c9fbe15729ecf93d424558663597625cb8

    SHA512

    a55efbaa06773de445a7565a654273d771f657ff1d798142b8dbba11c3fba3fea60cf5be453d74c5da144e254e3bc96f58da7921637ed2022acfe76b082e7dc2

  • /data/data/com.facemore72/kl.txt

    Filesize

    235B

    MD5

    3523f8b5c59141b1327d24b6a7d63066

    SHA1

    f90c76206b1f662cf8893cd52c7696634e2bd447

    SHA256

    547a213206f86dad0ff0b59ce9163734d16841c3a28eb087b5d89eec2f7f7890

    SHA512

    b0db6196a99bbd2673e6ab8f55edf1001d32c2adad8b7b80d43baee6cd7fffb5f6afde40294bf279bfbfdef60ea0926757adedecd24cee128c4a1700bc7773c4

  • /data/data/com.facemore72/kl.txt

    Filesize

    76B

    MD5

    0b9240197bcfdf41d81d511a6365f892

    SHA1

    ccd0572d75689ff1e1c0e487da29b33bcfeb2df6

    SHA256

    b244675b3e9bd4b93587db03315bef4ebaa1b8741e98a6c8cdce6616d01efb20

    SHA512

    efef39503395fad97cb181fb3bb314b421fdfbc97f98142aa99fffda1e43ba79997f7788de52d6a6307b21956a28213d6a7c86a203ba8e5640fae1cce662024e