Analysis
-
max time kernel
149s -
max time network
153s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
29-11-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
478c43aa96a43cf26548384d171898aac7d07f2810b3b5e5fc5957a3cec27bde.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
478c43aa96a43cf26548384d171898aac7d07f2810b3b5e5fc5957a3cec27bde.apk
Resource
android-x64-20240910-en
General
-
Target
478c43aa96a43cf26548384d171898aac7d07f2810b3b5e5fc5957a3cec27bde.apk
-
Size
2.6MB
-
MD5
bbcb3edd3b5102029ca963cf0023cc89
-
SHA1
efd6608a2da1874e3b4a17768727fed71c3b665e
-
SHA256
478c43aa96a43cf26548384d171898aac7d07f2810b3b5e5fc5957a3cec27bde
-
SHA512
079ef87a9b57691b9ed120cfc6b81b06ef3bad931ab657479a40b2eb90a8e0837f2f94dfea0a6c03907fe770d31442200996015f578f4502b952713bdfa45337
-
SSDEEP
49152:jQY3tFeBhovmr5+WW9NR/7yF/wL0Ra7eEr3Seo3BysEIcv62cEWvMjCyYnZRmXZW:zjeBhoOsp9Of7Rd3BANcByYn+JfZSQ/S
Malware Config
Extracted
octo
https://asdhaskhjdksjahdkasjdhaksj.hk/MTBiYTAyMTk0NzJj/
https://shdiuvhisudvhuishvdiud.hk/MTBiYTAyMTk0NzJj/
https://asdasjhdgasjhdgas.hk/MTBiYTAyMTk0NzJj/
https://qssxsqxaqxqazxaq.hk/MTBiYTAyMTk0NzJj/
Extracted
octo
https://asdhaskhjdksjahdkasjdhaksj.hk/MTBiYTAyMTk0NzJj/
https://shdiuvhisudvhuishvdiud.hk/MTBiYTAyMTk0NzJj/
https://asdasjhdgasjhdgas.hk/MTBiYTAyMTk0NzJj/
https://qssxsqxaqxqazxaq.hk/MTBiYTAyMTk0NzJj/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-6.dat family_octo -
pid Process 4215 com.maincertainubl -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.maincertainubl/app_DynamicOptDex/uE.json 4215 com.maincertainubl /data/user/0/com.maincertainubl/cache/bbdjinjdqgcyav 4215 com.maincertainubl /data/user/0/com.maincertainubl/cache/bbdjinjdqgcyav 4215 com.maincertainubl -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.maincertainubl Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.maincertainubl -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.maincertainubl -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.maincertainubl -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.maincertainubl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.maincertainubl -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.maincertainubl -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.maincertainubl -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.maincertainubl -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.maincertainubl -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.maincertainubl -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.maincertainubl -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.maincertainubl
Processes
-
com.maincertainubl1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4215
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ecd45c664f6dfb240195ba6b0abbda98
SHA1301a3213b24051a82b328496126b10289c51dafc
SHA2567aa878297f91d13158dfebe6f8bb1fd79485ea1876b49b490c28fb47f526ec34
SHA512bcd12eb54fa185135af63ef050e31db97bcb402aae01aa7bc88c187e965e0353786add1ea858d2262418350fd9389c53f4519c5de6f577fd51d8604583623ed5
-
Filesize
3KB
MD548a0fe11acd52a2f97ffb7ba4c70cf14
SHA1c360d9a5d7d4d4c9200e2b1d0b72f1a9239a8394
SHA2562712ee19b39713f5cef2ea62c3ea2e2d06081e83d841ba64e06fc84f3df1f972
SHA51242a93b91f531133db0a0c42781e2681b60994e61e02493a8bc2bb11229754eeedff7a4dbecac047a4e4f8cd7168e9ef9e7a55c5b322b2e1dea7b94c6718aa34e
-
Filesize
450KB
MD501b512a325d71763c80f88afa1462418
SHA198e4c4743bedbaca5371c0cc15838e05141e48f2
SHA2568028d8ad7d66be1ac427c82a276b16c784d83e4c6db67589af88e33d22f6f228
SHA512e92d62affbe45086bdc05bd6ad424622a90ba9a71c6f65fede83634410e3644a75ffe080a747426d8ee4fb16fd0309c1cbd1d8755379f2d8e82c76ca1296bc11
-
Filesize
465B
MD55ca85368b20f42e8409266a2cbf8c20c
SHA15a83bcd982460fe9c8baffc76e528d5f2426a236
SHA256bcc831dd2800822039a3356a9e45a706b29ee226564977b920a51e4d36718d1a
SHA512d696204909aeea90718f4369deecd932ff445ed1dcdeee48a464aa924fd92d0c08e01be27c047593c1d269882c2c61a8e52598795f9e53897e31d275c2ac9029
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD58210432e7c8d767084a16794cecee2a6
SHA13048eb59aeb883bd903dd7793cbed555d21d658d
SHA256c400ffa190b4f49d066baedba5b592e05955c97426d25756c5d3c6d45334e7c9
SHA512a30179400bbd6be11208d4426014c3491fa34f179311876834c4dc0d05c8efc66529b06fd2795e58e5860b98dddd864535dd1101093d5bbd23e08b07e72ad42d
-
Filesize
63B
MD56c0ed9a64b3483d622fa216c61ec6f01
SHA1da2520a3fddb3f4d110adff2e2abf5adab250e16
SHA2567ccd9947424f2f270a1771976b46375e96e362090f30d6e67ebbaff36ebd2e8d
SHA51257230a66d2f733fd2a6677499b4c2dd95f469bef25d812ccfb68d0a0b75b3f5305731ca8fad775ecdddbe1dfa80d130e48d0895c19c8c81496fa39e7c3125612
-
Filesize
54B
MD52428b89b348685cc50ec8b4e491eddbb
SHA1918327d78b331c25552e09edc9f5592bddb417e7
SHA256c7727f198e80c2dcca467f8ef1dea378eee061a3451fc99eb3f52b30b6c893e7
SHA5120036326c494f75e249588ee6c2569992df8fe28f4f56305c469d6dcb708323cf31dea0ac75f46cc27eac8bc3470990e8f91a39aaffbd81fd77f31bc6b8085fb2
-
Filesize
437B
MD5b4f09a5e0d5ce6fc13fdcc223110ed61
SHA158100ced9cb0726656c5cc64752ccbae46091198
SHA256ff9bed0eec3a4a1e06d41a7747c30ad9aa4fb7a9cd9e69811c7ee506a629555f
SHA512ee05f98c1f4779463714d43f3e3b50f0a3fdbdc301148d5934b3f45dac455ff401bee7da951b86fb5bd3a773483fa25103c03b40414d861cdbcf412f38a7692c
-
Filesize
7KB
MD51a7dc908f57f23353712a5e9a6313027
SHA1b0d687e2d350c32b45002247274e37ca5b0925a1
SHA256fae3e9547001b38a03dd4bf0a32d3c45456b72634db314de4ef4a7191041edd4
SHA512c5ddc90f855fcf65890f9c98aedf9c3310f998abd8d3aaa3a4d519096de7028516e80f18cc09810dda9cc85fecb297144edbde559821e8626bbe6dbfec15b451