Analysis
-
max time kernel
141s -
max time network
142s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
25-11-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
66b9c7721f219ec48312d8b02db8b68c4d4129f5724a93d27d73bf0c7cf34be4.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
66b9c7721f219ec48312d8b02db8b68c4d4129f5724a93d27d73bf0c7cf34be4.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
66b9c7721f219ec48312d8b02db8b68c4d4129f5724a93d27d73bf0c7cf34be4.apk
-
Size
4.7MB
-
MD5
04a296d15ee7d9434fbcb2df8a910dad
-
SHA1
b3efab1601128434efd1f5800aa0e967c64ae7df
-
SHA256
66b9c7721f219ec48312d8b02db8b68c4d4129f5724a93d27d73bf0c7cf34be4
-
SHA512
6ce3b1c5f7273c75e547e60c06cfe5631a93ae9fc74df27258a5405c1633f5e5c18a27e99b974edbb1f4d33c3a46eec3176007f9c67cefbed485600ac500e76a
-
SSDEEP
98304:GW7XALqwKZH2vCHMCh+2TfJmGRgxBDkS/gGxA/FRJd7OPL3Nb8I8y:RcxKZH2vCHMCM4gbDkVP/FHtOj3R8I7
Malware Config
Extracted
octo
https://94b6c9bebf541c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://94b641390330721556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
Extracted
octo
https://94b6c9bebf541c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://94b641390330721556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://74b6c9bebf541c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-4.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bookjust7/app_dex/classes.dex 4484 com.bookjust7 /data/user/0/com.bookjust7/app_dex/classes.dex 4484 com.bookjust7 /data/user/0/com.bookjust7/cache/srbjrxznjcjv 4484 com.bookjust7 /data/user/0/com.bookjust7/cache/srbjrxznjcjv 4484 com.bookjust7 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bookjust7 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bookjust7 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.bookjust7 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.bookjust7 -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bookjust7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bookjust7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bookjust7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bookjust7 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.bookjust7 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.bookjust7 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.bookjust7 -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.bookjust7 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.bookjust7
Processes
-
com.bookjust71⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4484
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD569192bf18834f87f0e2cf876a7422357
SHA14551783d3b735c138ad67cb040b34ea38d3721ad
SHA256da8c08ef5847e9597904af73e61472781f5d92e0866abfe1d89342a58e98c1ac
SHA512157ae1ce6ca44db2e4cf1386d7716baba60d8ad566e32bf48370057eeaa29e14384ad38331334b624d08a7643393f868eacb545f0130f2f5d527ef3ccaae5db7
-
Filesize
1KB
MD537b331af9f0b7823c157a8c62da1995c
SHA138aee8856b2287ca261830e0a92243b5d7b68f8c
SHA256feee67d2f3a59a6e7c8516c3ec81d424ca0fc1af15c0d8f5595a6645c6d65fff
SHA5122a8ea26b6c4f6df557021c5270c0eef6dac647e285e38f03ac2c834e95a1020fefb2b9f852f9c8a5a30d241b670438442440ca68fd2f700962bdb207687daec1
-
Filesize
1KB
MD571479d237b1ca017d27c7c72eea49119
SHA19ea740364667ec726f9abec628fca66a8bdd593a
SHA256636a6a48f5c4e2fee45b945f49096a336fdd0f207b623d301af3544f84d45d07
SHA512a2db0620f40ba9d75dd2faa00210a32de51640b500dca7ef41d30f14e96348d62d571f9b148946724f9ff300ead7ecaa05a5d2477ba991f6f826ff81499fa5f3
-
Filesize
351B
MD535971800e1d1011e244bd39c7cd7be62
SHA102fafa17e140b46704fb094e3f43755f3f67cb8c
SHA256d1728926eb4d7aa049b4b3ed652a4d9a9ef8bfb10b6aeef95455a235ac9b03d1
SHA512871e2a8a0fc43beb6cc0fc753aed9ed433fea9405d640ba1b3b29f4e358f03fa3e31d56731648da07d770046b2f9d9a7b5a1ce36b48ffc10630b0f6513766027
-
Filesize
1.4MB
MD5012e4e7b2c7cfbc183c648f3c2fbbae2
SHA16d7cb419e18fe321b67c3a9cdef67f885421e50d
SHA25645439725b62c64ee4b312ab5c4b062ba7a2882d4d9be7a44a1dfd1f63465d04f
SHA512cdc7e4877917748281a17abaafe8dd2f5585e3a0ffcaa65e3f22d91f777227b34e5399e75cee2226736a0b56ca52b2deb1248b7177d645d96b4b9e137a6b7e30