Analysis
-
max time kernel
149s -
max time network
149s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
25-11-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
2bc86df5487d9366eda47013cc724622308420315dbd6759822b43d3241ca448.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
2bc86df5487d9366eda47013cc724622308420315dbd6759822b43d3241ca448.apk
Resource
android-x64-20240910-en
General
-
Target
2bc86df5487d9366eda47013cc724622308420315dbd6759822b43d3241ca448.apk
-
Size
2.0MB
-
MD5
d2a362314104307c83cc4015cdfa2747
-
SHA1
b2a42a2ebfac9d68b855ec30ac427deb4d7fe0f0
-
SHA256
2bc86df5487d9366eda47013cc724622308420315dbd6759822b43d3241ca448
-
SHA512
531bf0eaf3d7f37c4f6381bb1c7677392d5bd8c04f6c4ad67a38592fa987e0d49e03ca0e51843c5020a5e6d4e0ba5a0cbd1901144308e0f944d7de1b276a17de
-
SSDEEP
49152:+4zfTox95vWcYfK7eP71CyBHtskMYv620E+HMbCyYnl5mXdmr1aQRrC/YAXfP:+i7ox9AcM51BbN0FyYnqNmZaQ3UP
Malware Config
Extracted
octo
https://discount44today.online/NTQ2ZDEzM2FjMjY2/
https://easyforpro901002.pro/NTQ2ZDEzM2FjMjY2/
https://mobile0team0stat.shop/NTQ2ZDEzM2FjMjY2/
Extracted
octo
https://discount44today.online/NTQ2ZDEzM2FjMjY2/
https://easyforpro901002.pro/NTQ2ZDEzM2FjMjY2/
https://mobile0team0stat.shop/NTQ2ZDEzM2FjMjY2/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.cutsome46/app_DynamicOptDex/Hctf.json 5230 com.cutsome46 /data/user/0/com.cutsome46/cache/yronmmgewzjnm 5230 com.cutsome46 /data/user/0/com.cutsome46/cache/yronmmgewzjnm 5230 com.cutsome46 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cutsome46 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cutsome46 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.cutsome46 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.cutsome46 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.cutsome46 -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cutsome46 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cutsome46 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.cutsome46 -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.cutsome46 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.cutsome46 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.cutsome46 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.cutsome46
Processes
-
com.cutsome461⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5230
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bac915380aeadcce1cadec99ab2a45d7
SHA1838b2558cf24042af8358d51963c1d26cb193578
SHA256a781895dd703c83cb306308f9d90bd86d0f9f8f907a4d4ba921f6be0e7a4d6ef
SHA5120c7165f09442881f761e69d26f7eed53cf618d7b1f44945e8308cc8f833812b0fc84e78744aaa100d4df5c44050d0ef585e25db26f042b05ecfc640e1858e76b
-
Filesize
1KB
MD5232559ab95e3a1bac737aa552c77d3b9
SHA128719c5b6c56a24cfb23c924b9c2f5d6db5a939f
SHA256f014b7a7fa2b39b38fe2807002fa3bd9146513fb9cffe9750c4828657db138fd
SHA512ea8ab67f317cf8fbd4d020e6a7c42261bfd58f98246a96fec9eff322853fb3392b951563006b4a0b9e3dbb75c4d9a5b6bb74893a05c22f4b9f0a91162ab3acfc
-
Filesize
469B
MD561fd0dbd09953ba9c5df563878941b4e
SHA1e6aa5a894964cd010a14cbc8f1fe023ae573bbf0
SHA256515e1d80ce6ee3cbae432d2bab7e47255586871198bb3e78dcb46eb711e45612
SHA512dd9048ef7634a39b8231273a521f9d0015696e8e4e3e8fcbe2467068d082848abf4611ee812d3ff866ac86f88b33cc2d7d4ad06a18c04369c3e0a0434708f00f
-
Filesize
166KB
MD5a7ab8370575f45e7dd72be6878196466
SHA179643d01d529d53b32049d974e6679d3f3161f65
SHA256f859310b896adab4caa7f4757b74831a30d262a4acbdf926b63edef29c162990
SHA5129a6459569e233d1aca452fef396aba42bf0649c54cb94d0e39b4f94a0e8564bc3f71c311be3b8cf194b5bfe4ab3d88b6ed14c4b6a557678efdb6690cb4c35751
-
Filesize
437B
MD5b6d4632e63247742939d45c4599688df
SHA1402b6dd37d21cdb7c8afb3c7b8e80766f765a80d
SHA25690e57aabfee1f3421ba40f734f9b81d81e463ad357ae2a8beb741faea0b4b8dd
SHA512dcfbe098d13cb865e5ed665a9b07b11ceeabaf67ebd001fcf33ba897115cd091bfb36e6627fdc0ac0865c0112bdcd661dbc58fc7d24f3396b8beb51e578ff122
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
45B
MD50483d2a1cee77126fb06a61d00e4910b
SHA113e00358400a3f051ee0239908372bd7916488bc
SHA256d3858ac96233e9efafb10eaad906b213213a89f2fb08f1207d89cd9dff633091
SHA5123bce899d1e125d377b401052f70f01bcba21c7fc3160debc29eb21088fc66148737242fa53ce20fe65c0162c8fd241d69cee66d760c8599ee94ea4c596f49fee
-
Filesize
63B
MD59c3c667c9645681c4fbe80fb750110f9
SHA12f8a0d1b9c1a977b0d64f3fe3b53b6c433b938a4
SHA256955bc72ec6add04f584aa26270244397da8c780200023c54c644da7e305332e5
SHA51267192ed5e2811402b6449e3d94de0036f20ac670a5ac018128b8dd83e031c78ddabc45c7db1e118fd945662674a3fe529c6aa1b4dfb3d67c7119cd9c1fa98b23
-
Filesize
45B
MD5e702a7f59d5083054ab387799a818183
SHA1e0ab93b17e75ac4bb21a1d3a48280d9b5707cafa
SHA2562fa3c72708dcec66f24b466dad456563b0cc31831704fc3912b456676db8158a
SHA512c0a3739564430a2fcfb2216194c02899890551326ab0d92960f81b85d105e21be8f4e167170cc0c8572a180c65724084fac0bfbe3b821deb340d662299b9195d
-
Filesize
2KB
MD5f589df47faf2fcd38dfed25dc28c358f
SHA1f8d226aff61caa98858bb714275b104a29795ce9
SHA256a5efee99e841501675fb6a73e65c11c21a3edd55c3b5920c890a5eb56063a4dc
SHA51232ab0e5913d98fe0d1da848ec78d237efafbcb4944a952d0c86c9b9d1df763f66bb25183ec37afc20ef7dc5784bbc8fea14bede0d7bd6957ffcecbf9f4966250