Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
18-11-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
73d3e8023ba36e1f89377a9f85ca9bfc5e7e8f9f566056341eafc85696f7e6da.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
73d3e8023ba36e1f89377a9f85ca9bfc5e7e8f9f566056341eafc85696f7e6da.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
73d3e8023ba36e1f89377a9f85ca9bfc5e7e8f9f566056341eafc85696f7e6da.apk
-
Size
1.9MB
-
MD5
cf72562e2263776d54be0bbd9e9d3909
-
SHA1
af3368fbdffaed6f089dbdd77d170b09dc9fc8c7
-
SHA256
73d3e8023ba36e1f89377a9f85ca9bfc5e7e8f9f566056341eafc85696f7e6da
-
SHA512
03e349f663de23c2f088f58a4d2c73cee8eafaaa569b683b506de1666faf08ff735410ed534bbc9e13d701e24369742be1d0d540027b5737751b144173e60241
-
SSDEEP
49152:VoF/+qiX0EnMFMab8dABmPJUG3LpFsn3PB/JlXX2ZGZbmqId8tAE4KoSJ:VoF/+qVEMFA6IUYdFO/B/nX2ZQ/IRc
Malware Config
Extracted
octo
https://chroww.top/MmEzNTkzZDFkOWQz/
https://lauytropo.net/MmEzNTkzZDFkOWQz/
https://bobnoopo.org/MmEzNTkzZDFkOWQz/
https://junggvrebvqq.org/MmEzNTkzZDFkOWQz/
https://junggpervbvqqqqqq.com/MmEzNTkzZDFkOWQz/
https://junggvbvqqgroup.com/MmEzNTkzZDFkOWQz/
https://junggvbvqqnetok.com/MmEzNTkzZDFkOWQz/
Extracted
octo
https://chroww.top/MmEzNTkzZDFkOWQz/
https://lauytropo.net/MmEzNTkzZDFkOWQz/
https://bobnoopo.org/MmEzNTkzZDFkOWQz/
https://junggvrebvqq.org/MmEzNTkzZDFkOWQz/
https://junggpervbvqqqqqq.com/MmEzNTkzZDFkOWQz/
https://junggvbvqqgroup.com/MmEzNTkzZDFkOWQz/
https://junggvbvqqnetok.com/MmEzNTkzZDFkOWQz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.governtake0ioc pid Process /data/user/0/com.governtake0/app_DynamicOptDex/ldciZ.json 4795 com.governtake0 /data/user/0/com.governtake0/cache/aivnloe 4795 com.governtake0 /data/user/0/com.governtake0/cache/aivnloe 4795 com.governtake0 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.governtake0description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.governtake0 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.governtake0 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.governtake0description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.governtake0 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.governtake0description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.governtake0 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.governtake0description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.governtake0 -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.governtake0ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.governtake0 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.governtake0 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.governtake0 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.governtake0description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.governtake0 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.governtake0description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.governtake0 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.governtake0description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.governtake0 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.governtake0description ioc Process Framework API call javax.crypto.Cipher.doFinal com.governtake0 -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.governtake0description ioc Process File opened for read /proc/cpuinfo com.governtake0 -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.governtake0description ioc Process File opened for read /proc/meminfo com.governtake0
Processes
-
com.governtake01⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4795
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD548ba3b7c9f270d6a0ab58d901c648101
SHA1d10c2d5efd9c7e13e2367e43e48b431397d0cc36
SHA256c9d634e9429156c03b0ac7acf05e28beb26864d36c9946642fe25c0fe64c1de6
SHA512a07b563b3a9f3f2693aa0d4ce23c9b4a1149eb3aaee308a5546c045e3c89aed7c4d6fa38a4838f2aaaef31af320ff54e814e06fb64ab66ea0cae43269759fa3c
-
Filesize
2KB
MD5de1d853e7952e7d36a7d5793e3045fc7
SHA1b9407a2c1a5f0901ae288a392831c5ee8beb8754
SHA2563cb4b87577bd41fe7195715ec61f9db3902e121514de28dadbc0a8db5c73efd8
SHA512b643671c2a70e67249cdba9f47fa66c0f6ee8d1fc758c49086fa7a60c64d3ce3ed058c39b8717c2c3503932ed9ef0ee4559e95ada66d45df29011e564753bd7e
-
Filesize
6KB
MD55447d973c54b0c60a81de4f22120e99c
SHA11de73d16ba315b62f8f505bc86e4e8c2f8e89da5
SHA2561876367ec4c0667c719868f3ec15ca6252193e12196bb042934687cccdd88eb7
SHA51273f4fd75e735b8a713ddf923c20cf4c97b135e4974fa3847196ea1277e0ed6b2fedfab91f2c8cc49db4076542351ab65cfa4c9917201b1b54c415f05f642746d
-
Filesize
449KB
MD59dbdf61845830233da0fdd72c2fa8d21
SHA107fe74f39dd629393b89f818952af4873fd040a3
SHA256c16f113110553da7b2995936017262c8cd21042228941954c51aac079efe6ef1
SHA512315b8831fcd05bf455f24b2b2cbe347c35913c65b0849285fb497da0e7393c84dce4e57132067cf043c663802b9ed27b9c815954333968ca61c19e188a4e0a17
-
Filesize
336B
MD53f744305b59e59a025abb653ad8858ff
SHA19281598cd988b088661763a42f09f58a02e418df
SHA2568a99cda7ac60b37b0a701cdb1c91ab6d94b8653412732bb65e53c2f64adc1d23
SHA512a9a4d6dbb983269cf341e0180439a3d83449ce69068d098e6eb7c5587dcae3ed6e15e93418020378a20e0f94be405558268efd51f0aae9277895c2919e0a124b
-
Filesize
480B
MD5fa4260fc805da2393efc1d2e79b80b28
SHA158db23b3fb259296b9317e1904df81bdc0ace6c3
SHA2569d4867f01bd85ce5fc049ebc67e851986a08e264a9118f40c2cbb0e9a85f8890
SHA5127dde9387ab4b373f95c389394c69e5703a7b1b4159049ac3afbf680c3e6d49866dd46f347e1dd9db9006b86327243a2e55951d950bda1ac1a89e1020cc38aab8
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD567ccf9658e8895f3d8d5ea5091730063
SHA131c3e2af740810bdcf7f680ef72a7fa814de95f3
SHA256a7b75ac497c1f47e10d29677712838476d63221051f37445c2cc4e4f3fdc973a
SHA5124f8404d0cf215b97cf524b5f05f92be1fe9b9674646947803155de1b728d61287be39f11e25e1e569c3bf1d248d9b08642560994f3dad8fbfa9ad607fa531062
-
Filesize
63B
MD55d694f1ea0c339b5c4fe8c5fe07173d9
SHA11efef944ac01c21c72950724c4a160db22021a95
SHA256b7d626f7bdbdae90c1f7d28ba7d29780cc6321e1f214e57a1a06ff634df2a16f
SHA512ee4bace7be38592876ee417b231cc56d3ce97fe45b754769379f0e3dbaf147d8f08637a7c8d7feb598af78790a9eb9a803355bd25c64d2bde88ebbcdbe89c771
-
Filesize
45B
MD51387b1749ef70c47c0c03d3312eab4fd
SHA1e153220fe86348c07444c26987040ce0bf0923e2
SHA25661fb6032d38ff55ad62870dae6c2edf2215dbfb953afee31d29b542b2143b0b0
SHA5128fd64f91b188a0cc6583a8f41b58c38e1818e85d2a4add7c25c188b308d3b5146253229c90bcc7ef34290d360f0da43e040c14310907b7716e2f671c6a5cf336