Analysis
-
max time kernel
149s -
max time network
157s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
05-12-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0.apk
-
Size
224KB
-
MD5
d5bfb98d212223d1a2a59441ccca542d
-
SHA1
afcb10b32e8c821b962af2ff225dcbd20f4fb34b
-
SHA256
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0
-
SHA512
52b0babe6549c728484fe41e470e9306ca633df3ea9ec3ad813e5dda04a8a1a8a72500ce40f9c0f4408f1c07ddf5aef215b57feef59e787fb201f1239ece0564
-
SSDEEP
3072:zNUZ0F0980sGvq9HW6lvgWDoW6kiMgDOFVcn/NBgfyaedZyll3cchpvpR:zU0F0FjOplvglf2V4/NiySl19lH
Malware Config
Extracted
octo
https://154.216.17.178:7117/gate/
Extracted
octo
https://154.216.17.178:7117/gate/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_octo behavioral1/memory/4275-1.dex family_octo -
pid Process 4275 com.adaxffsfzfada.zbsvxgsvbxhdgs -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.adaxffsfzfada.zbsvxgsvbxhdgs -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin 4275 com.adaxffsfzfada.zbsvxgsvbxhdgs /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin 4300 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin 4275 com.adaxffsfzfada.zbsvxgsvbxhdgs -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.adaxffsfzfada.zbsvxgsvbxhdgs Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.adaxffsfzfada.zbsvxgsvbxhdgs -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.adaxffsfzfada.zbsvxgsvbxhdgs -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.adaxffsfzfada.zbsvxgsvbxhdgs -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.adaxffsfzfada.zbsvxgsvbxhdgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.adaxffsfzfada.zbsvxgsvbxhdgs -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.adaxffsfzfada.zbsvxgsvbxhdgs -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.adaxffsfzfada.zbsvxgsvbxhdgs -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.adaxffsfzfada.zbsvxgsvbxhdgs -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.adaxffsfzfada.zbsvxgsvbxhdgs -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.adaxffsfzfada.zbsvxgsvbxhdgs -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.adaxffsfzfada.zbsvxgsvbxhdgs -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.adaxffsfzfada.zbsvxgsvbxhdgs
Processes
-
com.adaxffsfzfada.zbsvxgsvbxhdgs1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4275 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4300
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
451KB
MD5cb004b201c567db64910e65b984c9447
SHA1c64724627f791c91ef1fc11e0504106f843da186
SHA2568aba800e4caf3ea5442f0fee7a584361129518d04c465fc52b9e96954dd9c757
SHA512ab53cc64802d9dde3f3221621467d8f7200aea6e76a3e8fdbeac531c207dca1098bc5e47a1e7d8f02fd9e12a9f3252acbe6c6d253a337dfb365ff917b5425ffa
-
Filesize
427B
MD5ce3ff2a0312500108b78ec67a11301b5
SHA1df02a6a2010f6e4c7413b8f17eb8abbd69241b65
SHA256a07c97bee0f250c8b3897c20a4e4797b9a22bcad70024e42dd07e1e7f0bb6509
SHA512c955564cb82a48a2c88b78813d96791db2aa7f5eb0d9a5ab965ce739be7d3ebd9df98aea4be663399971a4e10b217991b6ccf8ec454b50b59c8b896998539ddc
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
232B
MD59777ada50b6f8c8df8bfc5a6181a16dd
SHA1ff322910bf2ed08bb0c32e887e7d05133a6e1550
SHA2569528e9269930e2dc3a99325f74a14186f2d55acef20f3e7e7fdde00769397dc3
SHA512ec8ce3c3c0cd1bf8df832b7fa710483579d3f97e90383f8b3f9ebdb59400d62ce1b8fe52062e203efbcc797b757b3ee359dc33244dd9d19a1c46502aadb253e7
-
Filesize
54B
MD59abd5c8d971ec62906b9a1094e063ae6
SHA186f2253a3be71c1b2c2f0319fa98cf1aa62c7ec2
SHA256f29b7690cb736bb9c86a962a954c9c9d04959f22a2816ce10524459413e3c0bc
SHA512227b69d62dbd9fa693fdaf23f005f781098fa0eafaef38e417419ac95506eccc0e9e99b35cc967708091f4bb4599863028cc85c3ef3c294fe679e0c385a72f23
-
Filesize
63B
MD509592f2d40e8414814e22ae5fa5a6523
SHA1dde9277a332a15fef28e2cfae390796fa73c1209
SHA2565b289a710a7c0d88b1bb20b64d3aea2f8b305f2a6a3e8bb079ba6f919932d658
SHA5123ec69f18af4b72010b80d2ceb351b77732de16b8f25217a7cbf7041b2c15f72a7e7a64cda7cbe5a7f210e0eb6f93e9b1425681645331837d6c7834dbd9ba3c5f
-
Filesize
451KB
MD5572cce35235126c17396d9a7441ed2ec
SHA1926e596d0a7db144ad34a158f066572b6accb7f0
SHA256735e62f1e9e5c2d765f59726cc1f6f7fe2568fc16790d89a4654c88fe1e08e8d
SHA5129e9b2a926a75291be9e41dd0d3349dd43e2529a86e5f7ae51c3f3ae15342cdb5136d84b149b286bd6ba80788b6de81f5a81a6b9fd1967045221999f44ad9bafe