Analysis
-
max time kernel
45s -
max time network
141s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
27-11-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
568f9de7b899862fc62d5ea9e54bb047ff0504bbc59bde033fc0722f183b59cd.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
568f9de7b899862fc62d5ea9e54bb047ff0504bbc59bde033fc0722f183b59cd.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
568f9de7b899862fc62d5ea9e54bb047ff0504bbc59bde033fc0722f183b59cd.apk
-
Size
1.6MB
-
MD5
332f2cc3294fa4bd0a549ffac5062aaa
-
SHA1
46176a7179904d1b009d10528cf313f53788600b
-
SHA256
568f9de7b899862fc62d5ea9e54bb047ff0504bbc59bde033fc0722f183b59cd
-
SHA512
e73f47df18565890de123d539df680e59a21ae9528ee75b0c63f70b6a65072d262b9a02165cd499c15345b9a21a5102d559865ad347676db272a8c536547d65a
-
SSDEEP
24576:eakAUbC02dP3ZhhBKB8BHYn4qdzmhMVJn4yfnXqXsyZsSgpraCYGPjGZxgFpV3xM:eakzbChhhsBmE4CSMDLfD/SgpW/w0Aq
Malware Config
Extracted
octo
https://hizliveguvenilirshop.com/MWZjODg0YjhhMWVi/
https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://4394b64c9b41c459d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://4394b64535326c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
Extracted
octo
https://hizliveguvenilirshop.com/MWZjODg0YjhhMWVi/
https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://4394b64c9b41c459d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://4394b64535326c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
https://74b6c9bebf541c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_octo -
pid Process 4250 com.seabedwz -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.seabedwz/cache/bwewuosrqzf 4250 com.seabedwz /data/user/0/com.seabedwz/cache/bwewuosrqzf 4250 com.seabedwz -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.seabedwz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.seabedwz -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.seabedwz -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.seabedwz -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.seabedwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.seabedwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.seabedwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.seabedwz -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.seabedwz -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.seabedwz -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.seabedwz -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.seabedwz -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.seabedwz -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.seabedwz
Processes
-
com.seabedwz1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4250
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD53616dcae30a4a5a6559601953534f018
SHA174c93314876493fdefe1ee131f274e4b4dab4fd3
SHA256fc1e70f96501893dad415622aca19e0080930a9976d346ab913f5a2c8518ed8b
SHA512bda9195e117a2ae2a650120230c7f4d2922c5270a59f5d6db2e4f5675ad6bba94e4f05bd9bbbafed534844e6d3e7aa8f93d2f661474a7e89d91beb56fe66324c
-
Filesize
517B
MD56b9412e945d8575af8872bf8efcd513b
SHA19e8fb7ac0610733072e2ac12056d3a9a67c6fda9
SHA25686b7eea49746355eb8c9751de71433651dd44899a39c2048e81ed2d3499b086c
SHA512f57c0124160d440b686b398883a58b8386fe3449d7681399accb1f684da82db1a773eb4b2aff689107af5556b74a8b16dd1369dfefa1231436803f96ffd37a3d