Analysis

  • max time kernel
    148s
  • max time network
    130s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    09-12-2024 22:13

General

  • Target

    3b7b6ce960b2289ed54a3c8a169b88f3a3ee715afbf66e37c2feb075db461fef.apk

  • Size

    2.4MB

  • MD5

    168ac0aa8bba38fbf95bc4741d0ae800

  • SHA1

    0dfe55e531f88d8f3361a67a1355f7045f0cf498

  • SHA256

    3b7b6ce960b2289ed54a3c8a169b88f3a3ee715afbf66e37c2feb075db461fef

  • SHA512

    ffed6d463db6edb815c0cde93620d0835225e1105ad5a4f8fb232f92c805e99317ab3ef237415b4270d522d57d45ac49cde086464fb547aa7a24d7fc1af2e0a5

  • SSDEEP

    49152:1Q2XkuGHWvwmqAb/7ubbMZ9c/qDAMF9tRRsQvIz8O021zelOuZTY:LAHbmqAb7ubAZ9c/fs99Ry9uJY

Malware Config

Extracted

Family

octo

C2

https://332137453981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://34437453981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://3637453981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://8237453981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://62333981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://6255553981d0595033c23.com/MzQ3NjU5NDBhMjNj/

rc4.plain

Extracted

Family

octo

C2

https://332137453981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://34437453981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://3637453981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://8237453981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://62333981d0595033c23.com/MzQ3NjU5NDBhMjNj/

https://6255553981d0595033c23.com/MzQ3NjU5NDBhMjNj/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.lowpower27
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4254

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.lowpower27/cache/oat/tdxwzmoesknq.cur.prof

    Filesize

    492B

    MD5

    a22f0d110e45ad331781488498620083

    SHA1

    a90ecde6ba106e9ed5b4277a5722cd167b2155a3

    SHA256

    44b4c62c063f4cc856347b2ff27b339ccfa63a5b67778a0b07ae6b81504ba3d2

    SHA512

    fe81c34de5f2db52c7ed1284a697fd5813f29930b02459176f2831e2cb0bc0e1859a26304a01fadf522df6555cf10d103e85c961397ff2269434d8cfec74f414

  • /data/data/com.lowpower27/cache/tdxwzmoesknq

    Filesize

    2.3MB

    MD5

    f275d01e68b41ad3f7d1a2ca168fc6cd

    SHA1

    f014f72fc29ad58c42e6a9c20eccc4fbf93fa7ef

    SHA256

    7c160980b6f66198e69e2294b6b2f4a28361ee469dd774ec65f0ac3e7bc1a84f

    SHA512

    4a04b86557004d1fafbc2973cbc53aff9b619e6e0a6f9c066a76469e569dfe24e404cee048f61a8c2977ae732ba37e5fd59e2919535d7a7265897ddc7a681599

  • /data/data/com.lowpower27/kl.txt

    Filesize

    28B

    MD5

    6311c3fd15588bb5c126e6c28ff5fffe

    SHA1

    ce81d136fce31779f4dd62e20bdaf99c91e2fc57

    SHA256

    8b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8

    SHA512

    2975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6

  • /data/data/com.lowpower27/kl.txt

    Filesize

    63B

    MD5

    a3d14b8a44e9fc18d2c7c68b7ae39c8b

    SHA1

    703be2299bde3ed300d93e037b1284c36404ead0

    SHA256

    eec694b7f1cabae80fd145086b2182680638b510f42c6437ec08d46413290ab9

    SHA512

    21527a6203bd128ef7161a8d243d990d54b5f618eeacaa1f1da357fdf2208d0edff4174af9a11f36ba5b9992c47943fbcafed5242f1065f70eccad119deb6239

  • /data/data/com.lowpower27/kl.txt

    Filesize

    230B

    MD5

    03acc0069c2bf13b3fba49fe5b3a2589

    SHA1

    eee967efb155695d5f2045dd58f1c56090dff59a

    SHA256

    5c0638eef83fe2d2583c2c51beb7cab75972d118183f152db884854615150ddc

    SHA512

    903e0b93884b581faa7df73743957e7be4b76fafa7ded118ba161c4f8b241875b1b48cbb336ba34dad6f5881456b41001b568419b07fcf44be87239027e112b1

  • /data/data/com.lowpower27/kl.txt

    Filesize

    54B

    MD5

    8843fdef66ec0740a4d0f7d1ce6f59fd

    SHA1

    5cc37da03fe6c20c536524d7764f8551a3a12971

    SHA256

    cbd47fea1cc2ca2caef44d2e70709cb6a0f028763a577e238f7eecf555b3f5c0

    SHA512

    d8fd6192dcea258fc2fe999a30995c58c4b021b820bf4ea518c18c02e4fb17753507d71b6953e347108ccd11a23d247012427b3cbb1ffd6a8be0d0c422438c7d

  • /data/data/com.lowpower27/kl.txt

    Filesize

    423B

    MD5

    6bf9e7ca3ca9efe54622f2c9335cf695

    SHA1

    53cca2311eae2ef763ec22ccf93c69cbef05cbaa

    SHA256

    b2882e681a67f41335f2d4c81d4ccb6ff9bbb7603a71d1e836b4d57114838cd5

    SHA512

    e6bc48cf4ffd7f2f723e2fb43d3033298299f501c76f77c38010633172e662ee71db81e24e990e8ddcbbc155334cb94bff965e71b5492be06e7b648a61db918a