Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    05-12-2024 22:05

General

  • Target

    8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0.apk

  • Size

    224KB

  • MD5

    d5bfb98d212223d1a2a59441ccca542d

  • SHA1

    afcb10b32e8c821b962af2ff225dcbd20f4fb34b

  • SHA256

    8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0

  • SHA512

    52b0babe6549c728484fe41e470e9306ca633df3ea9ec3ad813e5dda04a8a1a8a72500ce40f9c0f4408f1c07ddf5aef215b57feef59e787fb201f1239ece0564

  • SSDEEP

    3072:zNUZ0F0980sGvq9HW6lvgWDoW6kiMgDOFVcn/NBgfyaedZyll3cchpvpR:zU0F0FjOplvglf2V4/NiySl19lH

Malware Config

Extracted

Family

octo

C2

https://154.216.17.178:7117/gate/

rc4.plain

Extracted

Family

octo

C2

https://154.216.17.178:7117/gate/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.adaxffsfzfada.zbsvxgsvbxhdgs
    1⤵
    • Removes its main activity from the application launcher
    • Checks Android system properties for emulator presence.
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4275
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4300

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin

    Filesize

    451KB

    MD5

    cb004b201c567db64910e65b984c9447

    SHA1

    c64724627f791c91ef1fc11e0504106f843da186

    SHA256

    8aba800e4caf3ea5442f0fee7a584361129518d04c465fc52b9e96954dd9c757

    SHA512

    ab53cc64802d9dde3f3221621467d8f7200aea6e76a3e8fdbeac531c207dca1098bc5e47a1e7d8f02fd9e12a9f3252acbe6c6d253a337dfb365ff917b5425ffa

  • /data/data/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    427B

    MD5

    ce3ff2a0312500108b78ec67a11301b5

    SHA1

    df02a6a2010f6e4c7413b8f17eb8abbd69241b65

    SHA256

    a07c97bee0f250c8b3897c20a4e4797b9a22bcad70024e42dd07e1e7f0bb6509

    SHA512

    c955564cb82a48a2c88b78813d96791db2aa7f5eb0d9a5ab965ce739be7d3ebd9df98aea4be663399971a4e10b217991b6ccf8ec454b50b59c8b896998539ddc

  • /data/data/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    28B

    MD5

    6311c3fd15588bb5c126e6c28ff5fffe

    SHA1

    ce81d136fce31779f4dd62e20bdaf99c91e2fc57

    SHA256

    8b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8

    SHA512

    2975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6

  • /data/data/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    232B

    MD5

    9777ada50b6f8c8df8bfc5a6181a16dd

    SHA1

    ff322910bf2ed08bb0c32e887e7d05133a6e1550

    SHA256

    9528e9269930e2dc3a99325f74a14186f2d55acef20f3e7e7fdde00769397dc3

    SHA512

    ec8ce3c3c0cd1bf8df832b7fa710483579d3f97e90383f8b3f9ebdb59400d62ce1b8fe52062e203efbcc797b757b3ee359dc33244dd9d19a1c46502aadb253e7

  • /data/data/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    54B

    MD5

    9abd5c8d971ec62906b9a1094e063ae6

    SHA1

    86f2253a3be71c1b2c2f0319fa98cf1aa62c7ec2

    SHA256

    f29b7690cb736bb9c86a962a954c9c9d04959f22a2816ce10524459413e3c0bc

    SHA512

    227b69d62dbd9fa693fdaf23f005f781098fa0eafaef38e417419ac95506eccc0e9e99b35cc967708091f4bb4599863028cc85c3ef3c294fe679e0c385a72f23

  • /data/data/com.adaxffsfzfada.zbsvxgsvbxhdgs/kl.txt

    Filesize

    63B

    MD5

    09592f2d40e8414814e22ae5fa5a6523

    SHA1

    dde9277a332a15fef28e2cfae390796fa73c1209

    SHA256

    5b289a710a7c0d88b1bb20b64d3aea2f8b305f2a6a3e8bb079ba6f919932d658

    SHA512

    3ec69f18af4b72010b80d2ceb351b77732de16b8f25217a7cbf7041b2c15f72a7e7a64cda7cbe5a7f210e0eb6f93e9b1425681645331837d6c7834dbd9ba3c5f

  • /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin

    Filesize

    451KB

    MD5

    572cce35235126c17396d9a7441ed2ec

    SHA1

    926e596d0a7db144ad34a158f066572b6accb7f0

    SHA256

    735e62f1e9e5c2d765f59726cc1f6f7fe2568fc16790d89a4654c88fe1e08e8d

    SHA512

    9e9b2a926a75291be9e41dd0d3349dd43e2529a86e5f7ae51c3f3ae15342cdb5136d84b149b286bd6ba80788b6de81f5a81a6b9fd1967045221999f44ad9bafe