Analysis
-
max time kernel
149s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
01-12-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
7bf99c3a33f31613232729e6df3b8a81b25ac54a8c381d09bf20631fbcfa2c95.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7bf99c3a33f31613232729e6df3b8a81b25ac54a8c381d09bf20631fbcfa2c95.apk
Resource
android-x64-20240624-en
General
-
Target
7bf99c3a33f31613232729e6df3b8a81b25ac54a8c381d09bf20631fbcfa2c95.apk
-
Size
1.8MB
-
MD5
59317e631eda3f12727045e1e5918056
-
SHA1
e2be70729eaffb2ed617b8f1a7b32def1a61951c
-
SHA256
7bf99c3a33f31613232729e6df3b8a81b25ac54a8c381d09bf20631fbcfa2c95
-
SHA512
91dbb053a0d3cf53564569231f488ee65722a443ce214154441e235e44d5079236394bf9acd13884a96292f70d3865a310f93aada2ac02ff70aefa5e3703f821
-
SSDEEP
49152:8UlhE6wXGl3qlti8eOBTPuBb9sXyZGZbmqDHqCAE4KoS1:8UlhWGZqltiTOt0hsXyZQ/DaE
Malware Config
Extracted
octo
https://zaglefolki1.info/MTU2OWE0NzJjNGY5/
https://passajire555.live/MTU2OWE0NzJjNGY5/
https://majestike8ca.top/MTU2OWE0NzJjNGY5/
https://jikugac818v.vip/MTU2OWE0NzJjNGY5/
https://5a9udxg6l6gd.su/MTU2OWE0NzJjNGY5/
Extracted
octo
https://zaglefolki1.info/MTU2OWE0NzJjNGY5/
https://passajire555.live/MTU2OWE0NzJjNGY5/
https://majestike8ca.top/MTU2OWE0NzJjNGY5/
https://jikugac818v.vip/MTU2OWE0NzJjNGY5/
https://5a9udxg6l6gd.su/MTU2OWE0NzJjNGY5/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-6.dat family_octo -
pid Process 4310 com.hasdirect1 -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.hasdirect1/app_DynamicOptDex/xaPjM.json 4338 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.hasdirect1/app_DynamicOptDex/xaPjM.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.hasdirect1/app_DynamicOptDex/oat/x86/xaPjM.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.hasdirect1/app_DynamicOptDex/xaPjM.json 4310 com.hasdirect1 /data/user/0/com.hasdirect1/cache/austunkmyklra 4310 com.hasdirect1 /data/user/0/com.hasdirect1/cache/austunkmyklra 4310 com.hasdirect1 -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.hasdirect1 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.hasdirect1 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.hasdirect1 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.hasdirect1 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.hasdirect1 -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.hasdirect1 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.hasdirect1 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.hasdirect1 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.hasdirect1 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.hasdirect1 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.hasdirect1 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.hasdirect1 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.hasdirect1 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.hasdirect1 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.hasdirect1 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.hasdirect1
Processes
-
com.hasdirect11⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4310 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.hasdirect1/app_DynamicOptDex/xaPjM.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.hasdirect1/app_DynamicOptDex/oat/x86/xaPjM.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4338
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5713164e49a5e35b3cf2ae777370a0e13
SHA1fc5a1253c8ffdfe50a9d9301e237337c79c8227b
SHA256f465c43a43d42a35b635171d02227d052bbd5ee357594f3aeb373387a56c97b0
SHA51237903560913adb02868577f89c7aa1118bfde16d0545e5bdde44355de230bc75eee61cf8737d6174c99a103c884002d0b08a33fe91456db829de7ad112e7d4b7
-
Filesize
2KB
MD5a162b5c6d3e0e5a5af7f56dde9a8da72
SHA1672923d1f30dac24bbb11a1d4a2912112ad23b3a
SHA256b6394ebc8890c35837216c5cc5fabea4d7ec6024ecf616aa5427b5b5687937f6
SHA512ce29ac56845eb6e47a5d163e694c6d84944e93ed865fb20a41956504d17b5588e23217150f2e2170f0fc4517beb463c3803c7a2c63bb6d5a4342e34e54ef8f66
-
Filesize
457KB
MD5f181134772090910e13ae250eff983f3
SHA132251968bbf36493d19e371e22631b040e2aa991
SHA256e2c3a3c24dfdf4f6420c07d4105bb2e277550bf49702899ed884e21038664249
SHA512934b13d218754725d15c589ff7f484b92f2ff2314b970f7080a858810261a0a2e8ae2b1cf4d7e74e23a39f43a844bdf87069eaf9c57f939061231e464d9dc152
-
Filesize
487B
MD5727f0865326793c49c259d15cb040cf5
SHA1dd602fbd36fd518e632f2875f0c801a15f91ff9a
SHA256689a72c7b16067fc6fe0a11c43f67dbe269e1218963526d32935f7719e1c4c84
SHA5129946135f8f01c0a990a3c8974dd51b76454848e717b1558043f626d5165816d490151d912adfba0c0aa1d77df0113180888121fe524fa8eeb63116f8c4e355d0
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
230B
MD547c854577f790c408658bd7ec1735d3e
SHA1f32bb9c3ae351d946048089ac9a87ec80983110a
SHA256692aa07d40d2268559e945a4eef04c52dcda9296810f1682ebbb0f26df8b2f56
SHA512ac94f097cf099fe1f185550527afdfd6bc4ceb4f7b798b60884954732859b8ecdfa525ac864fa56e7a4625ca6ad7770624bae8f035e680552cd48d4e267ad652
-
Filesize
63B
MD527ed7f502b7703bf9e8312118f4f498a
SHA123fa8696a34243aebb71297d0e96753d755f1fe5
SHA25643ee55be9f2d860ffd9dc157f756a4eb390e5816cfddad19f662e35a9d7ae8d6
SHA512bd0c744e63b506cc63a8d4bb425a41a3faaa0cdf343156aed8e0169083713a0c0d038509614b62f4d2eaa40ebf92dd18284fbf00cb516094f4888cf7e6b17c17
-
Filesize
423B
MD50cf65eb242e11707b4614ee2235343f0
SHA1aac103090017d34ad0a56467c38b8b4546f37160
SHA256f76382cb66f50db5a8aa58f8fc5eec97ba2de5a5808782376534e066c25f6d87
SHA5129d40f25dd92e2fa86447df90c9508ea1ffbb219a010d16a3aa1189427e04066d0c3fb625b6513beb74909c26446121d31cd26c55dc906985df4c36645f03393a
-
Filesize
5KB
MD5fda3d701259aa76037de68c4b93cf39a
SHA175dfa4828ab808f34e7d8cbc09996078b9d46d9b
SHA2566827aca8eab473ed19bc7f965d4db6d7ca0a3fff16ef5a4b78686f68d87bb213
SHA5123bc77ff2d816d7fbb42b421b3925f5eec25c75c4381aa060f3d958e936fc97f3567346019d6ac68c7c4fd39cc7e598104bca6bda26e9631b1eaace2c97019660
-
Filesize
5KB
MD52f5c4cb33f02a2a5672d5bb9f7098b22
SHA12d579155678816e6090ada0ceab1f0bc23b5d817
SHA2564defa7003ad85e22d8db613da6b23c1b80a32c7eee7588646649d10f81041087
SHA512679389e3ce96defc31d8c824dc0a650f4135dd2844dbb73fcef8cf58ee27506ebb0ea046c9f2dd24ed9c3ec8a3077d9c064831d5267e810aee109241e5e49f5a