Analysis
-
max time kernel
149s -
max time network
139s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
23-11-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
4052c9f77f76b20718057304f68b81dd6d4003564e2e7769c7c8e36493ab123a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4052c9f77f76b20718057304f68b81dd6d4003564e2e7769c7c8e36493ab123a.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
4052c9f77f76b20718057304f68b81dd6d4003564e2e7769c7c8e36493ab123a.apk
-
Size
2.5MB
-
MD5
b59173f46013514816707aadd31bf813
-
SHA1
4e726d1bff0c11615c30f0541eb535d8a58b688c
-
SHA256
4052c9f77f76b20718057304f68b81dd6d4003564e2e7769c7c8e36493ab123a
-
SHA512
e09e5d6febfb7b4137a5053b38a154ede7b64497371ede83076a06d2a04e29de1e6073e2418885725aec0c7374dc7e694f82ecdac2e8adde33e2ed9ef63a4ba2
-
SSDEEP
49152:wl5iwwmokzAmRKfzN3au/G7emeKWsgH2Uv62cBnEmGMPCyYnRILOYvNmXxSr1LQo:wl5iwwlkMZ7N3au/Z/tNanx6yYnyTvQ0
Malware Config
Extracted
octo
https://cloudstats112192.space/NTQ2ZDEzM2FjMjY2/
https://fingerprintstats12.store/NTQ2ZDEzM2FjMjY2/
https://wordpress00stats.online/NTQ2ZDEzM2FjMjY2/
https://staticlocali112.ru/NTQ2ZDEzM2FjMjY2/
Extracted
octo
https://cloudstats112192.space/NTQ2ZDEzM2FjMjY2/
https://fingerprintstats12.store/NTQ2ZDEzM2FjMjY2/
https://wordpress00stats.online/NTQ2ZDEzM2FjMjY2/
https://staticlocali112.ru/NTQ2ZDEzM2FjMjY2/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.gotthosebd/app_DynamicOptDex/miA.json 4327 com.gotthosebd /data/user/0/com.gotthosebd/cache/xbbaa 4327 com.gotthosebd -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.gotthosebd Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.gotthosebd -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.gotthosebd -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.gotthosebd -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.gotthosebd -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gotthosebd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gotthosebd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gotthosebd -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.gotthosebd -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.gotthosebd -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.gotthosebd -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.gotthosebd -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.gotthosebd -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.gotthosebd -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.gotthosebd
Processes
-
com.gotthosebd1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4327
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a00f27187c1e67976038d0bd15983c8a
SHA1e7154828edf2269a5e23a883238d028345074eb4
SHA256ed8f0838a46d9d0b4b21a880a4eaa51607d061e1e6d683638992c8593596c640
SHA512b43deff54a825c3ce07dd2c714d6ad3731a44b7f64908351d0faffdda8327095f65a0217ae786104a08571609169dd8af52868ff025dfc959a1e28acb0757a31
-
Filesize
2KB
MD5837f866379add962a1b6ab780694ec95
SHA125358cd47a92d4fa969773d9f631ec0963bfb458
SHA2563363a90dfe8b02802afcca202e80f824b44ccfc6a6cdda5e70f2041003aae020
SHA512f91b8a8c99ffeac0284a58d56271efb35efc8df7182071778bd2b9899d63b34b3d2df705305712513f240c670d7c9eb9692021cfe126e1a459204bdc9af55a39
-
Filesize
6KB
MD5efc266042f35ab7f1933ef7475c89d0f
SHA1cd30d17ea6070b14d1cc7348ed74439898d77132
SHA256deee95e0d98a2208fd82f2ae171f00aece8aeafd4e19c65ca68788747a8f30be
SHA512ba20a2a2a8350a0c1c838b840dda04961b21d04e99290a24713166d508bb03e0d67d982912bf3edaab4a84feda8ab8a506711b5406b3e74b84cec91092b0827f
-
Filesize
388B
MD599232ba8ca4d8d1537e7af4a30fb7896
SHA1fce1c1f0b31d209e6bd50b91a64c6fc8edafd8af
SHA256193e9935aca83d9c511976f86e417c9179c8268231ea878fa321be9ae1e12b90
SHA512785f64e53366ff6bee724a82ae7f15d5fd91f47ba334965a79b77a7c02158f5875d45ee0b5bb1b9fc784edbb8406d9c4c78d1043202337ff95d82efabb87ff70
-
Filesize
165KB
MD5293bb5b0dc1af20c721ccacd16750c82
SHA101c3f70f56ad1c00c14fdb3dd28746af570b8460
SHA256a61edf88cc731b9452e50916e281290878d5a9b0d5379edaa0a7da35f037e8c9
SHA51264b3e867cf990a79b2c7da2941b066a506f82d40801fb5a5445a1f3c8c041635838ccefb19878ca5ed66e830d1a3a8c5018c7edcda9067caff4382c1c40d7231
-
Filesize
70B
MD546eb9c3f142e0983667fb923f5812134
SHA11efc6306cbfcfc5254c8feb65de4c93f51f5f842
SHA256eec2ebdf345d7b023c533569b77af84d096ab16fedce60e47cf2670d751c2002
SHA512052c775001eb33fbcedbbbc14f6239e706eaf39b26f7a644f7a3ac80eb4839572a91bd465cb4e95734bfe78fe6048b96e443dfdfc67a0168ac3ad145877f3595
-
Filesize
70B
MD5e40c4519015cb77d2e35fee4fe87b0eb
SHA172ee482b50769ca346ce7a9fba0cd3415ebc0312
SHA256c0420adc49911b7889f05dd23c8bfbf64fe9a0260474abe098382f485a38cfe3
SHA512f1ce90ea608dcecc4369395a6fb70aa5c163caed366493f8d7758028f5954c43accd80d1007737bf23fb8de503f3b5b2982721e6c96f3bd52d744d4a199d4fcf
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
221B
MD543e7ffc285e6df816eeafd983ae259e5
SHA15b9166001991de81375eec2258a72ef164e6af21
SHA256edabf4185cb48eaa58ca3d9d4f0dfe6adb54f52b943535e25c5ef8be504db6ca
SHA51221417acf0ba1b031c61034ad893bb9ebdfd9d284874ac4c335adb0f924e8eb1832db897c5705f20ab6bd717a8d87eeede34de0ae2720d5d5a3467ef45b08fb0b
-
Filesize
52B
MD50ecf9820214856bf3ba1b6088bd5cab3
SHA168a3042f86e23664b4e2dddfb3cc795b83277ead
SHA25621546c34c29bd0477bf86c6fd82ad9fcd12bcb79e7b90cc1bf9b80b8d3d03ca4
SHA51262c5ef3aad5c0c58c6821ad8a6f8de786cd74a31a8cfb6ac3785791786369edb35f186efdc70ae239deca0ba1918b6b7c6594146dd95da05fa79ea55e94c5483