Analysis
-
max time kernel
149s -
max time network
154s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
27/11/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f.apk
-
Size
8.4MB
-
MD5
70ab871f494c38544e6a4de2baec9bf1
-
SHA1
87066ef241f959d67656cb982d8d72cf5b4a410a
-
SHA256
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f
-
SHA512
3b336bfa34276e281e07240daff65fcdfe3d71b8af1fc7dd39b653d190bbea17c55fd339c496a51d71e8b1b99cb6b5121e13c972e1256b03217f1163a460e906
-
SSDEEP
98304:1NFi4t5tVKW05iSRGA1SFVkhe+4j76G+lru2/2pC0s4rgI6NRs40bTO:17Xt5tUXraFiUpj71+zHlNR1Ii
Malware Config
Extracted
octo
https://156350786312d7feba2b1c9b7577097b.com
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4459-1.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.wbwlantest_watch92/app_tobacco/sjEJYO.json 4459 com.wbwlantest_watch92 /data/user/0/com.wbwlantest_watch92/[email protected] 4459 com.wbwlantest_watch92 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.wbwlantest_watch92 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.wbwlantest_watch92 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.wbwlantest_watch92 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.wbwlantest_watch92 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.wbwlantest_watch92 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.wbwlantest_watch92 -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.wbwlantest_watch92 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.wbwlantest_watch92 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.wbwlantest_watch92
Processes
-
com.wbwlantest_watch921⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4459
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
1012B
MD572dafaa4bc2ec844ec24cb06762f3782
SHA1fc5f9e4176361ab5391ebff63f15e4637627d356
SHA256a185fdbc61af43d58201401fbcc2f9f1def2cf7570c6876e332e0831270c671f
SHA51268e3231883b5b29d077c59522e0626e4b8215881255214debc1b1b5ccc7e7c9b048b259600d998aa7df3d30f64655102f7eb2ef6f17a27b597276a57a9de0b2b
-
Filesize
1012B
MD56df1256bfd77f45c8aaf23bc6248d97b
SHA13b4a8459f3a99824032e411f950bec91fa09d7e1
SHA256f364d0af4fa021b88a47ff3e7b33fd32791392737644778ae2eeb0e0a98cb50b
SHA512bb5cf8777bb1663724c91b9649df75f9280c0c8dcb17ff44b6bad87b8c992b81f32987575de78824df914dc7d297b61985d6cf92ad319a6372fd323717d392cd
-
Filesize
322KB
MD577dc50489b9323274732d27dc8a4e803
SHA10e02a3595b62489d0739d771881da8604d117c65
SHA256c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820
SHA5120684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58
-
/data/data/com.wbwlantest_watch92/oat/x86_64/[email protected]
Filesize483B
MD54a11cd7b77cd7a83ae1a08e99e4e6074
SHA1240731dbd1ae726ae06d7224cccb1dd52a93950c
SHA256f935e5a3f1432d0da0f47fc73e1934f6171d55c1ed6c4183017e961d81cd644f
SHA512299c6ffa6cd1dadc905868fafbaccceb919215387d7d3f40b8d47edbc9ca14217e0372d2c7e4cdbeeeef9afa2b6ef95fae8799360cdfcb76bd4afde7db650df2
-
/data/user/0/com.wbwlantest_watch92/[email protected]
Filesize526KB
MD5712b923f0b7b0544cb341dca61c24831
SHA18f4c884eea2248086c54b1895d04e47ca04ce5e5
SHA25679ea82fb4f52bbeb36efa8a2ffc45166fd2ac9e3e08127becd3b21d9fb2ab302
SHA512ad32f1fec2135544f618d482d7d2d74d4edcd7d2650091aca666a1472978cbf80b3dc6e801e92d2d4b8a0795eab276a007ba6e2028ee9c9ef2d1fd83ef8d7420
-
Filesize
1KB
MD5eb0786e9eb149ea9be97bb36efbdbf74
SHA1cd1ea145a7676421f76c980ef582dcf3089f9780
SHA2561d1d34b4c932336d855adebb16c1ece15798a00299e029d39135bf203ef5d03d
SHA5126d0ccc91682675cce5f7d28b40fc08ad371a2d49e09962206c00927f73af8dd5cde2f5921feab2214290761593d35026ee9f71385e1e96f01a8dbf2b4b54ccc6