Analysis

  • max time kernel
    45s
  • max time network
    141s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    27-11-2024 22:00

General

  • Target

    568f9de7b899862fc62d5ea9e54bb047ff0504bbc59bde033fc0722f183b59cd.apk

  • Size

    1.6MB

  • MD5

    332f2cc3294fa4bd0a549ffac5062aaa

  • SHA1

    46176a7179904d1b009d10528cf313f53788600b

  • SHA256

    568f9de7b899862fc62d5ea9e54bb047ff0504bbc59bde033fc0722f183b59cd

  • SHA512

    e73f47df18565890de123d539df680e59a21ae9528ee75b0c63f70b6a65072d262b9a02165cd499c15345b9a21a5102d559865ad347676db272a8c536547d65a

  • SSDEEP

    24576:eakAUbC02dP3ZhhBKB8BHYn4qdzmhMVJn4yfnXqXsyZsSgpraCYGPjGZxgFpV3xM:eakzbChhhsBmE4CSMDLfD/SgpW/w0Aq

Malware Config

Extracted

Family

octo

C2

https://hizliveguvenilirshop.com/MWZjODg0YjhhMWVi/

https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c459d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64535326c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

rc4.plain

Extracted

Family

octo

C2

https://hizliveguvenilirshop.com/MWZjODg0YjhhMWVi/

https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c459d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64535326c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://74b6c9bebf541c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.seabedwz
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4250

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.seabedwz/cache/bwewuosrqzf

    Filesize

    1.4MB

    MD5

    3616dcae30a4a5a6559601953534f018

    SHA1

    74c93314876493fdefe1ee131f274e4b4dab4fd3

    SHA256

    fc1e70f96501893dad415622aca19e0080930a9976d346ab913f5a2c8518ed8b

    SHA512

    bda9195e117a2ae2a650120230c7f4d2922c5270a59f5d6db2e4f5675ad6bba94e4f05bd9bbbafed534844e6d3e7aa8f93d2f661474a7e89d91beb56fe66324c

  • /data/data/com.seabedwz/cache/oat/bwewuosrqzf.cur.prof

    Filesize

    517B

    MD5

    6b9412e945d8575af8872bf8efcd513b

    SHA1

    9e8fb7ac0610733072e2ac12056d3a9a67c6fda9

    SHA256

    86b7eea49746355eb8c9751de71433651dd44899a39c2048e81ed2d3499b086c

    SHA512

    f57c0124160d440b686b398883a58b8386fe3449d7681399accb1f684da82db1a773eb4b2aff689107af5556b74a8b16dd1369dfefa1231436803f96ffd37a3d