Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
26-11-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
e34f5aa702bffb728fec194bf49951ffe3be039dde16f3acdc142b178fc88898.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
e34f5aa702bffb728fec194bf49951ffe3be039dde16f3acdc142b178fc88898.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
e34f5aa702bffb728fec194bf49951ffe3be039dde16f3acdc142b178fc88898.apk
-
Size
509KB
-
MD5
1592dbf70803da3d606054700091f9a3
-
SHA1
9d6b57a80f93a072c170d3e386f340bd0164b0e1
-
SHA256
e34f5aa702bffb728fec194bf49951ffe3be039dde16f3acdc142b178fc88898
-
SHA512
91577085dc421cfbcc9057db6b27658d981568e704b136f45ba2f488c1e4f3af3935b56c4fe52c6d6dc08ed8f440987346a6a15400534eeb8838c7827a104f6f
-
SSDEEP
12288:cLm2dna65c5ZoFkR7y2nuLuk7kD3OpePtjnT:cKOfc5gkROnLuk7lpe1nT
Malware Config
Extracted
octo
https://kesmecekarpuz.site/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz.com/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz145.com/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz878.com/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz5446.com/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz8455.com/NGE2Y2RjYjdmYjg3/
Extracted
octo
https://kesmecekarpuz.site/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz.com/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz145.com/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz878.com/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz5446.com/NGE2Y2RjYjdmYjg3/
https://kesmecekarpuz8455.com/NGE2Y2RjYjdmYjg3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.handhimzsd/cache/dhkmhbzacswes 4446 com.handhimzsd -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.handhimzsd Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.handhimzsd -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.handhimzsd -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.handhimzsd -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.handhimzsd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.handhimzsd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.handhimzsd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.handhimzsd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.handhimzsd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.handhimzsd -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.handhimzsd -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.handhimzsd -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.handhimzsd -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.handhimzsd -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.handhimzsd
Processes
-
com.handhimzsd1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4446
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD51e776fc5a2e827c379c419039c6acd49
SHA194b93ae2b11a9db511297653095d2673abf6f1ac
SHA25630a4bf02267b985849d5dfd7619752ac79231ff917a631f7f17df2a8256b9ea4
SHA512f38bca02ea21cd39e5567045dd66efd71f34543f2889cb32b2eda1c0fc43b5e41a9b38370d01f5e3e2904ea69f8a475ed626735e21af81e8b97a1c9ef85e4ea0
-
Filesize
377B
MD5dafc45f85d8c4e25a096ced187860cf9
SHA1c5ceefa179e8399eec9680a7ee0af4100baf1042
SHA256c3dae90cb203b3e1151494922133b1d8ec77b2f9a4f17890b024570cc63d6777
SHA5126c008252112d220d71511838d5ca1f466ed610860bbee5e9383702ed11250438db4080f560daa5c6f4ee62876740eafd73a1176f597989751f53950707cccbfb