Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
09-12-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
48bc5e8f778f01f8b1bd5c6bf034d4c50675c98318af50ecb852f7d8e078c9fd.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
48bc5e8f778f01f8b1bd5c6bf034d4c50675c98318af50ecb852f7d8e078c9fd.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
48bc5e8f778f01f8b1bd5c6bf034d4c50675c98318af50ecb852f7d8e078c9fd.apk
-
Size
2.1MB
-
MD5
bcbbc445f93288c19ee9168e803b9fca
-
SHA1
4f46109b43f033cdafa44a8fb79c77c94385a01b
-
SHA256
48bc5e8f778f01f8b1bd5c6bf034d4c50675c98318af50ecb852f7d8e078c9fd
-
SHA512
b45d5fcb6ad893c75eb81b887e7409c38da50c7d602ab7ebb2f269f53bacfb33d9cda61d0eecead6cfbef24dbca982591d6f658f5340fe0c32e388b88587f382
-
SSDEEP
49152:aRMHwtPg6fDR3cZWllX8L/MTrYwUYSSV9JDriLmUk97zC+su:a2HwtPg+DR3cZOqrirYwK2i6vr
Malware Config
Extracted
octo
https://oelikixanni14.live/MTU2OWE0NzJjNGY5/
https://r85d4kbe5729.vip/MTU2OWE0NzJjNGY5/
Extracted
octo
https://oelikixanni14.live/MTU2OWE0NzJjNGY5/
https://r85d4kbe5729.vip/MTU2OWE0NzJjNGY5/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-6.dat family_octo -
pid Process 4215 com.beenor9 -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.beenor9/app_DynamicOptDex/qslSt.json 4239 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.beenor9/app_DynamicOptDex/qslSt.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.beenor9/app_DynamicOptDex/oat/x86/qslSt.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.beenor9/app_DynamicOptDex/qslSt.json 4215 com.beenor9 /data/user/0/com.beenor9/cache/udpoedrlmdg 4215 com.beenor9 /data/user/0/com.beenor9/cache/udpoedrlmdg 4215 com.beenor9 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.beenor9 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.beenor9 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.beenor9 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.beenor9 -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beenor9 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beenor9 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.beenor9 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.beenor9 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.beenor9 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.beenor9 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.beenor9 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.beenor9 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.beenor9
Processes
-
com.beenor91⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4215 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.beenor9/app_DynamicOptDex/qslSt.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.beenor9/app_DynamicOptDex/oat/x86/qslSt.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4239
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e263fd0f2ef46826a192fbe917fec274
SHA180282e8a3d6536c8886e7e0ec127ba026359aba7
SHA25650975688ddb8694cd892ffcb95a7136fdc579fb4ca3d83ae80ad6b16476ab92f
SHA512dbabb1ecfc026d95fd8c7cd40f94fd7656a19ff30ae5cffdf4cbd9781e550128a13b4685167d0cace12268947e9896eda819b006706387a6cd9bc293da5477b8
-
Filesize
1KB
MD59ef9efec94da15686f21b9e762448436
SHA10ab8258c19de715b99e397982da89e4c79389acf
SHA256dce6560176580e23157648b4aa48a9fd0ebee192f0cb91bd11c112e8ef90a1d3
SHA512c8ca0acc808d6df6b921b847a47ba6e05bc4de55bd26d3c8ddc5d70b26c10d0099ba72d48647ac7c498f2ad3d6764bb8099f0813085b89dd639f112f929c5718
-
Filesize
473B
MD5b88bef20d986238e896f5f81dedfdb88
SHA1f9476e54bb20b8f8783976d2ebb26bfe2c6ecbf0
SHA256400f7186c0ad730e0e080927fac6fd6158eb3b8c7241d71065f25f468a34b015
SHA5120efabbf76fe4241fec55bdbbb7465a5f6b3cd1958de6d10f9005b82cc2ee50c50394f61a30f337007db4c249ea57697bdc3d2aadf7114e9a08fdbc26458b837d
-
Filesize
456KB
MD56354448ad1cc09668325701ddddac014
SHA1dbfc987e0921dc0285e3f59798d379eb60bd2947
SHA2560a11b12265b2ebfc042f4adf4cb85f9b80f3416be21d314e99ee6bcd52e3203e
SHA51275ac094323ba576ae57cb67847f900af2b63420c4f6e27d4733230c52f5df6ae143c3bf1642fc09b9931d3ded17a83b57040cabd4ded7b95183274bac0f63661
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
230B
MD5248743fc3daa31843cdea70844fefe14
SHA1cc3019d835e5ebe8d892f77fc8cd76307005cf45
SHA256e73760e6f63dd322d0ad96edfc18667a1c3548534d8fb21e5c4a689b64198752
SHA512137bf80c1359d9edccf8180df4b3c1877095edd98962b56f28e6fd394c94ce9db18aed418eb6d3fb70ea2464c5894653be202e94769fcc24fa033acf700377c4
-
Filesize
63B
MD5eaa061917c188b6bec237e6130c282f8
SHA1b64c195de4459189734371bee88719266b724d9b
SHA256dec63a1042b814f3a47f973934f8f3d04ca2ebac28f1f36f46dcfb23f64c5187
SHA51267cbeb2be8b74f60fef56e2dd35ab4980c416cec50ca58bcb6f277fcf19ffed2074ed7fe432ec0bbf52b69496143bb42ec404928fdb89dd8d1afe4b3ffcbd6ef
-
Filesize
54B
MD52eddb360d194defb18a711d6a1a2cdf7
SHA1a7e4e3b3e051acb0aa0db3597f761345cb70ad47
SHA256e98efdf1c8679864891bc918870d2b33ba1533829b2499f35dba1b6b26a632b5
SHA512c5f8ddc52695d55c3539a8d32667dfec5101434ff62ab6edc44cbabad75c67795ff95e5564c24aff13e8c9f25e426567cb8a8c63a55b848988b1270e7e1b5c13
-
Filesize
423B
MD596b3ba650bb723dcb76c11946b1948f6
SHA1eab5575c6b063858ef2f7cfbda7314beaa74abd2
SHA256ba0b9698d8773328c0943e21612e3c01ebd58c638daabfb115be4baf19e63667
SHA51269db7bdf9af9ca8960d0a007411af54deccaee689f2ae59fa46bedccad27f54d228efac03c13ae6adee6728bbc844a26d248f9a5307c31853b5c016f547b14e8
-
Filesize
2KB
MD5b9fa877a4494b3fefe2613cfcd99caae
SHA119714a420c3e2da1f252f3e02deda4c8fc5ea730
SHA256cdab4a46ccae5777b99b13d172df674c9b0ba0229eb93a55c1e120c599771eb3
SHA512f579b896317984459b32b6dd4786e4df561a2c475177ae7119d3c7e68c5af88b87c7ef5561feb1ee3f6423ec8c4d3c28abd8c6859db8fe9c076cc38beb47f348
-
Filesize
2KB
MD55ce227788ace57daa5125c682d9abf36
SHA179d30d4ea7d18631f2bb3c0bce586b4535da518b
SHA2567c1beae38eecd8c517813c8576336070dbbf41eb216f451d92868d61f82efe65
SHA512774b9c574ee260f73cd72d615ff9f0667a25c0fdca91a6bd9c91a9c2bb4946e121edd4cf0591fbcd48f1ab32ae23b68adaf545e3f9b47b1adbd47fc9a1a0b1be