Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    01-12-2024 22:01

General

  • Target

    f41834e0d8ec9e9d5f5d262eadb3d2059451e13b9eaee59d42c12b4510f59030.apk

  • Size

    2.4MB

  • MD5

    e86dd68fe6a00e7ed14f96f9cde7ea1e

  • SHA1

    7a1e5e72942cf542831d4b4b1221510dd6f03e47

  • SHA256

    f41834e0d8ec9e9d5f5d262eadb3d2059451e13b9eaee59d42c12b4510f59030

  • SHA512

    e9733d3d272eff58b44819dfde3baa043852c5f9f589c19f25bc130dbb0536e0f7d490ce244d7d51aeaa18e6012007bb36446c702f30f9e084182a8779c074fa

  • SSDEEP

    49152:e46Z14E3rKfLGw5HZ7MZ+IBBX90zjY3RK+h0ZHrZgr92UK4x/jaothy:Yz3qZH5MZnXyj8jMHdgZ999jaoK

Malware Config

Extracted

Family

octo

C2

https://hizliveguvenilirshop.com/MWZjODg0YjhhMWVi/

https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c459d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64535326c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

rc4.plain

Extracted

Family

octo

C2

https://hizliveguvenilirshop.com/MWZjODg0YjhhMWVi/

https://94b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92146d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://694b64c9b41c17a229d92156d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://994b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64c9b41c459d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

https://4394b64535326c17a229d921556d14a4ffd4.com/MWZjODg0YjhhMWVi/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.busymovezk
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4655

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.busymovezk/cache/oat/wgeyk.cur.prof

    Filesize

    344B

    MD5

    c87414d509ae541ec64ba7e3f9156e14

    SHA1

    018d87800b8b43513ff25433299ab322821a6d0d

    SHA256

    2c9bcd80e72953ed307e163f1ce34375af800c5fa9a5c8784560b30bd9de8c4f

    SHA512

    aff169ec98bff4112a1c9b239766d27aa53472235b1b088909bd44e7723d13e77b898eac467eccbffcd67538bebd80834ec3484a6c25e0ef7888c9558a416ece

  • /data/data/com.busymovezk/cache/wgeyk

    Filesize

    2.3MB

    MD5

    c6063c4023e6a695fbeba37bc061486f

    SHA1

    f4f07c70f6c250d8b87f21ea08e2d28a0bcf38ca

    SHA256

    50953962ce33f7d3a37f2c32809cdf67308f5b5a79f56dfced6b115e22041880

    SHA512

    6956cf2485e48335a963a8ee7f29126b41000f12db95771961d552b7970586d78fb1443f7a33dce2cd686fcb12e5e77b939696b65553182425c0a9cd596ffd9d