Analysis
-
max time kernel
147s -
max time network
131s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
20-11-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
64b535ae0e7d0f9edfcec31945310ea1c710f1aee18c52ac45c579b5a1ea3dfc.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
64b535ae0e7d0f9edfcec31945310ea1c710f1aee18c52ac45c579b5a1ea3dfc.apk
Resource
android-x64-20240624-en
General
-
Target
64b535ae0e7d0f9edfcec31945310ea1c710f1aee18c52ac45c579b5a1ea3dfc.apk
-
Size
1.2MB
-
MD5
57ea80a371feab800709e5b125e93a06
-
SHA1
f94f3f868141393ec9df11307eb7eddc6d9b734a
-
SHA256
64b535ae0e7d0f9edfcec31945310ea1c710f1aee18c52ac45c579b5a1ea3dfc
-
SHA512
aab66aa2e80a4289aa0fdd1964c60a3649fdf732384f1b888dcb10a6c4d49855f2d087e3f2cad245a7c5686cd6e6135ffc746a8d32613a8f8575b637dde8c1b0
-
SSDEEP
24576:IaibmdwiITEEFMqBAH98uswqtfncy82BOOHoOVepxTfzJwldqNfUQNtd:VS6IoE+qBAH9qwq/7XPyxT9EdkfUQNtd
Malware Config
Extracted
octo
https://siqnisiq.com/M2EyOTM2M2FlY2My/
https://xijunggao.com/M2EyOTM2M2FlY2My/
https://fujetgue.shop/M2EyOTM2M2FlY2My/
https://junggvbvb.com/M2EyOTM2M2FlY2My/
https://junggvbv.com/M2EyOTM2M2FlY2My/
https://sabgggsabggg.com/M2EyOTM2M2FlY2My/
https://sabgggsabggg.top/M2EyOTM2M2FlY2My/
https://sabgggsabgggsabggg.top/M2EyOTM2M2FlY2My/
https://nisiqnisiq.top/M2EyOTM2M2FlY2My/
https://abgggpoh.top/M2EyOTM2M2FlY2My/
Extracted
octo
https://siqnisiq.com/M2EyOTM2M2FlY2My/
https://xijunggao.com/M2EyOTM2M2FlY2My/
https://fujetgue.shop/M2EyOTM2M2FlY2My/
https://junggvbvb.com/M2EyOTM2M2FlY2My/
https://junggvbv.com/M2EyOTM2M2FlY2My/
https://sabgggsabggg.com/M2EyOTM2M2FlY2My/
https://sabgggsabggg.top/M2EyOTM2M2FlY2My/
https://sabgggsabgggsabggg.top/M2EyOTM2M2FlY2My/
https://nisiqnisiq.top/M2EyOTM2M2FlY2My/
https://abgggpoh.top/M2EyOTM2M2FlY2My/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.colddoosuj/app_DynamicOptDex/UWgpuwY.json 5059 com.colddoosuj /data/user/0/com.colddoosuj/cache/bbttmxgc 5059 com.colddoosuj /data/user/0/com.colddoosuj/cache/bbttmxgc 5059 com.colddoosuj -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.colddoosuj -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.colddoosuj -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.colddoosuj -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.colddoosuj android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.colddoosuj -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.colddoosuj -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.colddoosuj -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.colddoosuj
Processes
-
com.colddoosuj1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:5059
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD537fc167b6ec22e7a7ebd17e4bc9dc52e
SHA17df1ad43a39d1c22e48a24359e8ccbbdb1cd2533
SHA256805695ae70904a474cfbd18c62bfd7c036bd2f7f8d1d74e412f06b8173e5dcf5
SHA5121d9a129255b1cefc2aba214955874feae81d4e2c0c112090613e781ce50d1095e765d73b5d29563029a50f1a2e40bcd442e02e4b6f36b99d65fcf07f9156cc98
-
Filesize
2KB
MD5ea56c3bc743790e0c100c242b1bafb34
SHA114b19ea384f7e8d9bcd464a8d2bb52425b1a0b10
SHA2569cd8e9c12b8d5391cf59738230fa198cad24f7f442537cff438e076d6b52393d
SHA512271d22873ff693afb0b98b78a90ac5e06a2eb0b351008c1fad1770eb7c00b9304341efcfe92f67f0f8c42ded9f96c6e8d0665dcfa5a2477f1ce3362f1c06f38c
-
Filesize
448KB
MD58087d117f28be45559cb45b4bcd7c89c
SHA1ee2547667760be13c071da4a8f01258dce6ce557
SHA256275c8d5c41275965a97764cc51b39fd344d803b8f7a3b686a303eda2382266a1
SHA512328973fa9321c2ec2ec663dd8fd46d8753d7d6480d20d3f4a43b33da508d3231c650b7a062a586ae584b0a78339819d8de6a25ab0dabf88eed82c853eb9df6c3
-
Filesize
474B
MD50865bf75ef6e232b520c3f1cf4ee2e29
SHA1237a3c4c7b3f92eff1b77a25716213e99dcd2995
SHA25686a2d005128c50a049424a1bc966b538dbf8b75e1ecf8a1e7c1b7a6cea8319ec
SHA512bd120b45efc7e3db04239cffbd15b893043844d7e97ae725f00c80d645adf6fcdb714520ed3e593b7f888c380fc4208aa96422fb24f56d3eb3313df8ce410130
-
Filesize
5KB
MD50868097b61441c163c964fdb3610e34e
SHA1cc8a27912a5083e4fe998bd0fd2567019e739f7c
SHA256913842b54d425628cef2516b1537cbeb0b9eae5c71df5d652fa27f13585ef005
SHA5126ab9660fe5136be6596e4865be86d823ad1c44ba94df0f89589dbce352b39cf01014c94a4ba8fa883723b2d21f1948ff4d46315431788c9b66fe82b04d75382b