Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    27-11-2024 22:04

General

  • Target

    24a94c2754c81b9999eb89966acdc57a54f8b6678f80155ef81810fd4f2464d3.apk

  • Size

    1.5MB

  • MD5

    7edcae1b516383989e64fb60770fd66a

  • SHA1

    e8cfe1341cb27501e2ffe5db2df8c51b0137a28f

  • SHA256

    24a94c2754c81b9999eb89966acdc57a54f8b6678f80155ef81810fd4f2464d3

  • SHA512

    71a26266df00a8e590cedda6dbdb0d1217683f37e8ef979efe4a213a5f0f607ac41869b1d60cc1ae8824308bf689c5730ea1d1a159de5dc7bbe81bd2e9e47a09

  • SSDEEP

    49152:0yyyF9wSAEU3gUE6BwPPs4WUf1OfXYGtjCt:MwwfEjK1Uf1OvYGtjq

Malware Config

Extracted

Family

octo

C2

https://hizliveguvenilirshop.com/MWZjODg0YjhhMWVi/

https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c459d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64535326c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

rc4.plain

Extracted

Family

octo

C2

https://hizliveguvenilirshop.com/MWZjODg0YjhhMWVi/

https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c459d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64535326c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://74b6c9bebf541c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.ourplanty
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4664

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ourplanty/cache/ehyval

    Filesize

    1.4MB

    MD5

    93d1339427a739ea25d02af499af4059

    SHA1

    b1aaa16f6672ea7f67706e400a0cb4dda384806b

    SHA256

    df84aa5d9078d91f16e41214340b60d959bfc6b62e4b853f138ae1664ada9ad9

    SHA512

    98b9a55496126b26780c96c901538a54ba65d1a1b0e89d510544f7ceda2781dc1f7d66af959f79f2ea8d11bf2dc98ea3532d206a1d35136d478b3b6164e0ff4a

  • /data/data/com.ourplanty/cache/oat/ehyval.cur.prof

    Filesize

    345B

    MD5

    aa0a34504fd1c311361ed1191ca3c544

    SHA1

    b47943bb58bee87169e5ca52e34996f17bbc85f6

    SHA256

    c2a31b4aef86ef01b61d7e894c0981d759aca0ea12c063b3331b0023ce60fe67

    SHA512

    afddc0a3fa571ef50fbb6af732534ba27b4fd675553bcae80096bbeb19b8510666ace32d2bd37a47dd8b6cdd6664d9ff01cf391601548afac00be6afdec37a75