Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    30/11/2024, 22:08

General

  • Target

    bae8e8547bd334de011f07c338aaed16d134f7e9f70f4cfd562bfc62a944e5bf.apk

  • Size

    256KB

  • MD5

    4ee277a510ecd1635eb5a08551f29951

  • SHA1

    36a2d622862f5794904cafb16b17051966241a24

  • SHA256

    bae8e8547bd334de011f07c338aaed16d134f7e9f70f4cfd562bfc62a944e5bf

  • SHA512

    e536f17849498be13869367642e0674079f4ab4dbf321577fed6bc5b2a68bb807973b220079b4d219404f31bfaf3f2718804feb97428cc76685727b9aeabcccf

  • SSDEEP

    6144:st0A4g8fsuojKDVoJfEPY10ShOEJrWSw85eWBc1l1zg8:ng6EyV6MP9e1Z58l1zg8

Malware Config

Extracted

Family

octo

C2

https://154.216.16.134:7117/gate/

rc4.plain

Extracted

Family

octo

C2

https://154.216.16.134:7117/gate/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.adaxffsfzfada.zbsvxgsvbxhdgs
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4792

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin

    Filesize

    451KB

    MD5

    9cc81089c0e3f7b73bed57a85c6889a6

    SHA1

    03c90f987b3bb7627ec2340e772e6935a8ac931a

    SHA256

    6d0a63cfc0ca9e1925a32d8e063b580dda15455a2388e7f7f08288b1d1336129

    SHA512

    fe6231debb93982060a594567ae175cf72ccaec512f0a6c965d1cbd40db7edbf31fd90cb353a33369762bd2ab8ec8f22372551a256a56916f0bc4bc6d92392c7

  • /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    28B

    MD5

    6311c3fd15588bb5c126e6c28ff5fffe

    SHA1

    ce81d136fce31779f4dd62e20bdaf99c91e2fc57

    SHA256

    8b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8

    SHA512

    2975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6

  • /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    230B

    MD5

    eb84258b55ec3043658218895c92a073

    SHA1

    7d40303ad0f10689d164235c77789272da9dcb0c

    SHA256

    e73ab1948a3a32bf8b346b86f2e972f0a536003c1e1e11da76298b5657ce47c5

    SHA512

    fa90ada8b9d6000e5d568a9343920b68ba240500131cb527022b2b0a335b2b9d95285356d6a45fd67dea49efb3d5c4080995104d7f8fca6f539b109195bb2fdb

  • /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    63B

    MD5

    f7ff023f814b1c595b58194fc339da28

    SHA1

    68a61d1c5e29f70df8fdbe912652574bed47fd1f

    SHA256

    07485c819d5d888fe32cab943430e92284e951779df3c621e5bbabafb48de280

    SHA512

    0b05a01abe04cc7bc2ca5e789ad672f6bb1a3edaf6abc2fd85e8a2f70da3e7abc1435a61c17655fb8612dc242ea1dd0f838319a55522e0b0e2545fecf4807afe

  • /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    45B

    MD5

    c3b701fd3c09a8bdebd0f8588f801742

    SHA1

    2e8440dd0330b158f393d33626f9db326628e767

    SHA256

    77e6bf9700fc387e67520de588374247aef0f502c1260d9ea7075a743cc44a7a

    SHA512

    739a43110eff3e39da31c94db1f9408701d86cfa9351ede49fc772f359b22c59bdabf035934c056a23f25bfae89a62d784216968dd982d38ec77b11e7b9b2b29

  • /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    466B

    MD5

    b2cc1feae5d8606792862dad699c82fc

    SHA1

    98531fc1706ff62d165ebda5df058592a1513079

    SHA256

    44377b8c1010d5644c2e6ceded87da4673c159267e852938b4c3519a26b1767c

    SHA512

    794978a0bc2544597c3592b2c36513f00babf80203bdacf02ae75ce05ea86bede70b12447f00288cc4298f1f926062b787b839c730b8ade84d9e427941a1b1f4