Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
05-12-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0.apk
-
Size
224KB
-
MD5
d5bfb98d212223d1a2a59441ccca542d
-
SHA1
afcb10b32e8c821b962af2ff225dcbd20f4fb34b
-
SHA256
8d47670f9ff63c59c9b419e3ee8b7aaa03acb8b78084bcce4d574deb9bdaa9e0
-
SHA512
52b0babe6549c728484fe41e470e9306ca633df3ea9ec3ad813e5dda04a8a1a8a72500ce40f9c0f4408f1c07ddf5aef215b57feef59e787fb201f1239ece0564
-
SSDEEP
3072:zNUZ0F0980sGvq9HW6lvgWDoW6kiMgDOFVcn/NBgfyaedZyll3cchpvpR:zU0F0FjOplvglf2V4/NiySl19lH
Malware Config
Extracted
octo
https://154.216.17.178:7117/gate/
Extracted
octo
https://154.216.17.178:7117/gate/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral3/files/fstream-1.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin 4657 com.adaxffsfzfada.zbsvxgsvbxhdgs /data/user/0/com.adaxffsfzfada.zbsvxgsvbxhdgs/app_apkprotector_dex/classes-v1.bin 4657 com.adaxffsfzfada.zbsvxgsvbxhdgs -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.adaxffsfzfada.zbsvxgsvbxhdgs Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.adaxffsfzfada.zbsvxgsvbxhdgs -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.adaxffsfzfada.zbsvxgsvbxhdgs -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.adaxffsfzfada.zbsvxgsvbxhdgs -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.adaxffsfzfada.zbsvxgsvbxhdgs -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.adaxffsfzfada.zbsvxgsvbxhdgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.adaxffsfzfada.zbsvxgsvbxhdgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.adaxffsfzfada.zbsvxgsvbxhdgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.adaxffsfzfada.zbsvxgsvbxhdgs -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.adaxffsfzfada.zbsvxgsvbxhdgs -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.adaxffsfzfada.zbsvxgsvbxhdgs -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.adaxffsfzfada.zbsvxgsvbxhdgs -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.adaxffsfzfada.zbsvxgsvbxhdgs -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.adaxffsfzfada.zbsvxgsvbxhdgs -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.adaxffsfzfada.zbsvxgsvbxhdgs
Processes
-
com.adaxffsfzfada.zbsvxgsvbxhdgs1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4657
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
451KB
MD5cb004b201c567db64910e65b984c9447
SHA1c64724627f791c91ef1fc11e0504106f843da186
SHA2568aba800e4caf3ea5442f0fee7a584361129518d04c465fc52b9e96954dd9c757
SHA512ab53cc64802d9dde3f3221621467d8f7200aea6e76a3e8fdbeac531c207dca1098bc5e47a1e7d8f02fd9e12a9f3252acbe6c6d253a337dfb365ff917b5425ffa
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
64B
MD538df28264b530cd50111db7dd2126514
SHA137c474250d1a72bcb721ab96b97a9240be3f6dd5
SHA2562b04587d1d045d02dc6fa089e1bac9e5033ee76e88caaee37e2f671165fe1fb3
SHA512ae6c0fac29dd8f4d9444524da25c2d95e7e5b828c9313319354d5e0d9da3836949d2069758b1d6f6e66d13f5364a96175f340d960a56f9b54cdd606918acc54b
-
Filesize
45B
MD522e2ee880ef5d1067cf9501804873d74
SHA1fe9774bf58f179efbd9e33c06f0b0747240a5938
SHA2560d8ab2995e97e22d4f65cd686ea4714237f58dcfdee1a50dfb300f4440b4d4b1
SHA51285fe046a96671990df7512ce3247d483a1e6c008d2cf2060b1c75423e1db6016d40aad2843ec5d58c057154c649f138a2c1fe3699e0c437f3991cb13e4bc73e6
-
Filesize
63B
MD5351895c18763fcabeeb20b82e250bc6c
SHA193feef0102efdd3c32a925654919ea9342243e6a
SHA25606c478e4853bcc55298a0588a20cc6519b9ac145b9dc4bc483bd6fcbdf5a1c79
SHA51254ea0c2cc35e88aade035ba6836cab98f7e5dd21a376d899330e5258a2430fd8b4043f6e084c51d49e6e2b1d006516160adcd2c2690ed7c204982e7acc13958f
-
Filesize
470B
MD5b584d45ff941983d614ce62c62de0e98
SHA17ac27b0e311fdf2a7a75935350f45816149117a9
SHA256b2b45610096dc0ba96c111015a52f91d176e77e36e81cba684853264a3ef3c62
SHA512c54dde825b277e537b988a6e81d43175d10dca80cd1d6629793507b54214cfe3e3323f8160929a225508ac7beab3d99f3ca830bfda3ef9bce90c126c66fc4603