Analysis
-
max time kernel
149s -
max time network
147s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
24-11-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
1c2e5bcf2a4cab7eab12c0e617f4b931a3181f3234fc1c5b0779e93cdaf5be81.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
1c2e5bcf2a4cab7eab12c0e617f4b931a3181f3234fc1c5b0779e93cdaf5be81.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
1c2e5bcf2a4cab7eab12c0e617f4b931a3181f3234fc1c5b0779e93cdaf5be81.apk
-
Size
2.3MB
-
MD5
6df8ee45bd50ffff91bd0a7f824a1d6c
-
SHA1
0939e4c54bc528e2c62043e476d8ca5bc3bae992
-
SHA256
1c2e5bcf2a4cab7eab12c0e617f4b931a3181f3234fc1c5b0779e93cdaf5be81
-
SHA512
f7e35860d0ec3c4015d4242f1bf796a0f30869a5aed7ba9313bf35afbc67b09a4ccb369925209d523df2c042a3a9f138c4bbe0a661208da195327ba670800eff
-
SSDEEP
49152:H0VQ2V745t15yGpDjB0jw42LZbA7eQsk4gv62lEe3M3CyYntVmXF+r1WQRDC7Y0t:HGQ2V74/15yWejw42pjCNllyYnOV+ZWR
Malware Config
Extracted
octo
https://discount44today.online/NTQ2ZDEzM2FjMjY2/
https://easyforpro901002.pro/NTQ2ZDEzM2FjMjY2/
https://mobile0team0stat.shop/NTQ2ZDEzM2FjMjY2/
Extracted
octo
https://discount44today.online/NTQ2ZDEzM2FjMjY2/
https://easyforpro901002.pro/NTQ2ZDEzM2FjMjY2/
https://mobile0team0stat.shop/NTQ2ZDEzM2FjMjY2/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.worksize23/app_DynamicOptDex/wETXur.json 4525 com.worksize23 /data/user/0/com.worksize23/cache/gvtpkqkhfhler 4525 com.worksize23 /data/user/0/com.worksize23/cache/gvtpkqkhfhler 4525 com.worksize23 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.worksize23 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.worksize23 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.worksize23 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.worksize23 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.worksize23 -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.worksize23 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.worksize23 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.worksize23 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.worksize23 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.worksize23 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.worksize23 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.worksize23 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.worksize23 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.worksize23 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.worksize23
Processes
-
com.worksize231⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4525
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5bbf07383f55389639a43619851124af9
SHA117b329ca4cbac503bd33d8c15a9445f0d4d9d2c9
SHA25682697114f7ce230fae21e24240f18326fd2005001a0ce15c12d01f3208ef7c48
SHA5122f6bdca0fd6fbe2ab30448febda132976831172c04038141335267a504804c04240d29bcc31fb82cac811eaf14b741e385c43761c6009a9abe485ceb811071dc
-
Filesize
2KB
MD50bcc94f4cbed8f4bd62a3494bc15735f
SHA1919c235047a90f1b38a097b2d6deb08017658f9c
SHA256629ed1479864e8a84a97679b62337bd788ef04139cb9bc00eaa1fae06e8fdc1f
SHA512847699ec02c3bda86f68b44f12bf38be7f2f202e8c25217ca8faea0fe1e3db4ca670437701758bdaf73426b5667fd3d7b3b51666fa3620246fc0fd1ab927960b
-
Filesize
5KB
MD5b5b385e4667a10458e4f24be45eda168
SHA146eb83cf6d947f3289d525a411235c4097549606
SHA256ac0790fb7b4f5d49abedda3c9f0049dfd5f4b7323797438d82650cff1d06190e
SHA5128e6d84c4e03111e64c32585fb862f5d32bf1c454bc8d057fb3219596474ef5fe702c088a3b2ec412972c1f1b8da0963d26769024206f7f3ccd571af225285aaf
-
Filesize
166KB
MD5881cd7029f4e9a694076957fbea6a6cb
SHA1c1eed803c1b5de82e84ae7675ba55feb0d198336
SHA256512206ac8f52c72d1567462d6e612bcfd3f368f8c637c3843c90d27b95abb7fc
SHA512c8b67e0d26df32d9a132d3f90978fe5c3fc47145ad42ea67495f50a354ba563fc72004423d4573d0c9a40e930180df54800dcb1be492b998687c41dffbee8633
-
Filesize
346B
MD562d231574ce510552d7bd26c7800e553
SHA1610132b283a4c98232c57cb91856fca566949211
SHA256c60302a5139c85a742e53977517a88ae99b0cbe9d13737e67ea17668cd6c4ebf
SHA5120ca7404bf59fdfe26382427341513e581d60279ff6080dfbf0dc9c0c782f2fc1e6520787e8933fb3071155a343f8bfff9f822fc23375a3b1c9c420fb51854a70
-
Filesize
79B
MD531e88ea47fce8c049aa2b5939ab880ff
SHA14a6d3d3f43a87f9f28792807e0b01bc5bb4db488
SHA256146001e5bd0a50f0b4d0b7b25b629273e20d4ae420d062bc57107322da2c693a
SHA5120b4d309e780b76630c4ec6fb83e015ed799b71b5a964f12064026aeae01dbd2d38dd60b17a0d6a33b193d150b176db16b290e0d15f84a83077f82edff465ff17
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD5bdc203b9c1b1b1d0f724a47705ff9a56
SHA1d9cb1435d421d130c23a3ab3565d93690a6c95e3
SHA2568f9e8e825d6a388f843e0813b6c373d2ed1d79cb233ee70b5906726331100d0e
SHA51236d151c8095de4525f3054233fd887fab3369c2c318f0aee4e522974724c11662cd2c5e253758430c38dd74d84ff693f227a32373026352b0a926c6da4e0b5c6
-
Filesize
45B
MD514dba80f0eabf3588a2b67cd574f9667
SHA125f0810ccde29a8cb74193f19db64bb5c389aa10
SHA256d94048e5ba73a00c795f8aaaedf9d30e3f314a194b942a727946515b2bc1cfa5
SHA51266ee5a3f3ef3108efcf236daf84c79d406ddd68d95ace9f4cf68826de97aa444676d62165376edec3f8c4012b9a804419c9280757e4d5a894147f83f0a0d1ec6
-
Filesize
63B
MD57624616e27164d094be0d45b7bfd6260
SHA179e6802bd4f31bfe3f296091f00b68a49257f4f4
SHA25687539b88776d419c649bb5a7feb3116d9c5567818fa7d29a9e50f5c0bfa1c83a
SHA5124b5c30e6c6ed4e0945204aa2e01e93927de331e03fc7f09f0386f3011c3cf35d3be379c1e8dad570c5ac2d7b0e9b0e9082eb69e3cb525e9366db7b015d40c37d