Analysis
-
max time kernel
149s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
07-12-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
2bb42c2da58ea8b9e65176371ab1db520b174c413a95b41abda3b1d049c081c6.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2bb42c2da58ea8b9e65176371ab1db520b174c413a95b41abda3b1d049c081c6.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
2bb42c2da58ea8b9e65176371ab1db520b174c413a95b41abda3b1d049c081c6.apk
-
Size
2.2MB
-
MD5
34e7db88d47a03d6078bda36e8c5668c
-
SHA1
fc057d0ac8347d3310faca54708fcd482600c335
-
SHA256
2bb42c2da58ea8b9e65176371ab1db520b174c413a95b41abda3b1d049c081c6
-
SHA512
948f3c818e157c53125f2dc14cf3f84fbb3a50555ddb8eab01fe03d47f5692ba152c98dcf24eeef7d029996c667174034d2ef4f6fdfce253909f22727bf76c77
-
SSDEEP
49152:coMwE08Fw9oryftpAHXb/BucBB9aw5+k50GRLUCw:1E0RGsT2kuew5+QUZ
Malware Config
Extracted
octo
https://topflowow.top/ZmU2YzQ2NjZlNjc2/
https://bobnoopopo.org/ZmU2YzQ2NjZlNjc2/
https://junggvrebvqqpo.org/ZmU2YzQ2NjZlNjc2/
https://junggpervbvqqqqqqpo.com/ZmU2YzQ2NjZlNjc2/
https://junggvbvqqgrouppo.com/ZmU2YzQ2NjZlNjc2/
https://junggvbvqqnetokpo.com/ZmU2YzQ2NjZlNjc2/
https://junggvbvq.top/ZmU2YzQ2NjZlNjc2/
https://junggvbvq5656.top/ZmU2YzQ2NjZlNjc2/
https://jungjunjunggvbvq.top/ZmU2YzQ2NjZlNjc2/
Extracted
octo
https://topflowow.top/ZmU2YzQ2NjZlNjc2/
https://bobnoopopo.org/ZmU2YzQ2NjZlNjc2/
https://junggvrebvqqpo.org/ZmU2YzQ2NjZlNjc2/
https://junggpervbvqqqqqqpo.com/ZmU2YzQ2NjZlNjc2/
https://junggvbvqqgrouppo.com/ZmU2YzQ2NjZlNjc2/
https://junggvbvqqnetokpo.com/ZmU2YzQ2NjZlNjc2/
https://junggvbvq.top/ZmU2YzQ2NjZlNjc2/
https://junggvbvq5656.top/ZmU2YzQ2NjZlNjc2/
https://jungjunjunggvbvq.top/ZmU2YzQ2NjZlNjc2/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-6.dat family_octo -
pid Process 4255 com.groupsureepdu -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.groupsureepdu/app_DynamicOptDex/yxwb.json 4255 com.groupsureepdu /data/user/0/com.groupsureepdu/app_DynamicOptDex/yxwb.json 4280 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.groupsureepdu/app_DynamicOptDex/yxwb.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.groupsureepdu/app_DynamicOptDex/oat/x86/yxwb.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.groupsureepdu/cache/cjgxpplvxddsq 4255 com.groupsureepdu /data/user/0/com.groupsureepdu/cache/cjgxpplvxddsq 4255 com.groupsureepdu -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.groupsureepdu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.groupsureepdu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.groupsureepdu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.groupsureepdu -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.groupsureepdu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.groupsureepdu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.groupsureepdu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.groupsureepdu -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.groupsureepdu -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.groupsureepdu -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.groupsureepdu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.groupsureepdu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.groupsureepdu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.groupsureepdu
Processes
-
com.groupsureepdu1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4255 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.groupsureepdu/app_DynamicOptDex/yxwb.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.groupsureepdu/app_DynamicOptDex/oat/x86/yxwb.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4280
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5322db753cad51ad26413900bcdb67ac6
SHA1979e87ed78f19f7c6c05bfa3b6062a62d585b269
SHA256a3170e050ae4668d5ddd0e0e8441848bc1cc4dd4fb6c63fb09035f0c8052c875
SHA512d2b4e0a4223246559ab98c3f0ee6bc51774bf3475ef6ea44237b00e4b5261857a2fd433ae52c86f68b1ae3fecd06f71f9330cbcaa9c7652d5aa2b70b9db06175
-
Filesize
1KB
MD59cb326d028a7037b8572a50176a3f1b5
SHA10dbb28afb007ffaf89eaedd116a0043680760e47
SHA256e08ac6d3517585d2a725a78da5166a80329ebe90e5bcdab78d487e714d2bd43a
SHA5122f80eef13eca1edcfc6c367e14a82f2e011e6139060249994705425114ed3ad0b94f79a6b987d3ab87afb50335e6ceef84bcc343517d5a46305643bea7b027aa
-
Filesize
448KB
MD55e0372635b0359dff49538a00dee37d1
SHA113231cb16f0aa2d185988270c05264d8e4d9984f
SHA25613439e04255290c46cb3eb6f2e0f93b997c485a94b021d492e3937373350e643
SHA512dacb8a65fd82e812f4db59909658c3fb1b74f58933a6a7af1da8340496b1fd80bb56d1c2c58a932dc072730c2d530b0264c2b02ab74888cf02fb76b63c1f1ced
-
Filesize
476B
MD5cc5d1a78e410cc5d3bb858f945926b48
SHA180c55c15d52875bd82b8516c645745871f39ee2f
SHA256c905e34a12f2ae6eb68ec653b588741e8f8b68caf65fc5eaf8042f25bd6db8a5
SHA51280fcc8a47603598ecaa1a3f682e46368c15a2ba847d404d9e8e4ce1d043d6350ab7e7dd192c773576435681c4e5f8a717cc492e2e6eb8836c86bfa1e387874a4
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD548ba242f0b6127762ceef7940b69db49
SHA1cb1218926c5996cc1dbde4bab8095f2fbc6010a7
SHA256f03f66c20e396baf3093241017033f16116d3f80f1b886d5694c1ebb2ce17bad
SHA512cc4b48d1b2957d138a40513e43cf528f9c286a061838944f2ac8b2ffae4da1e82041f5797ca2a408458149763451c1c38b085ce614af3f51c9f17cb4cbc09dbd
-
Filesize
54B
MD590a74fb2fe111a7830aad31229430c15
SHA1579e9ecedac97390ae7f17c21459a699677e2c50
SHA2561b58bea3e662349bfb8ec6158bfa10a92849c83d163b36104c7016838b734934
SHA5129a4dff13d43befb5bb9921090e2bcaba3eefbf693b659395d69cc564f4174555e21b0f66bbba6d524ef8633dc2af280508391b40ad420ab07688e62fcedbe57e
-
Filesize
63B
MD5d165205f94e3c032b3196253456add34
SHA1e351999ea51f46da84a0b7134ddba23b6f3f3565
SHA256b84a723772ea0722f6a22eebcdecfa67d78fbe31824ffadda58c44896c509701
SHA5123026ea3332b1aa607486967c913bdf76e743db776e6a112e5fe2cdfb069ea92aa960611c731d290b2a8f9087d660b71619efbed568007ff0ff01a5f068219034
-
Filesize
437B
MD570b9924bb1ba2bf6c3b73719d421b198
SHA191e09975431de2ae1711cb1cc5a180707a03b93f
SHA2564d53056041feeb714cd088f664a340d278f28485b4cdbc7b8e9579b00438321c
SHA5123bd617e08f3e71a53861448ab90fb8875d6d504734db65038f45e10a2cc46a15cc5b14ecc35a03caeac741487f3609a2a2307be0ce4c11432ad2b84317cd34ba
-
Filesize
2KB
MD57cc2bd05badc7a2c16689a9a13ee7788
SHA1890492dd4bc2943a8db0195cd14badee3d30df61
SHA2567808892e72c2e4d091a6e061ff4358e8daf4d02861474945a6d18716a88418ce
SHA5122afd64e6f1a6b78912beab057fa41b38e4441df395238e24e1db0d1ca9fbc92dcb3cb85013043d1e03ea62f5030bae108c414cc8f99bd0c2e597f4474486f73a
-
Filesize
2KB
MD522c48fbedef405939d8b49ea6390d5af
SHA18b8929a1a2b8be40522a7df997259d83594eedd4
SHA256751b07eb881e09a79f0e999e4690a3aa251ca93ba3a1387e480419b47dcdb0cc
SHA512a7a0e33c89d4a40faf5f531046ab3120f2c1e16dba93b9bdf844534fd25483897fc6da4d80a000fd0d7c2a1f06ab8fe50794b16ddc965bed05503107ff0d61ff