Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    09-12-2024 22:12

General

  • Target

    03881da195ec401fa5ad2dcc2affb886ae932ede6659df3d991bccb5ee1ce47b.apk

  • Size

    2.4MB

  • MD5

    54129c6856aaed94560031780c4a8045

  • SHA1

    d2e5eff2e4a7b0d3ea9ffd57fd98d0304c43f32f

  • SHA256

    03881da195ec401fa5ad2dcc2affb886ae932ede6659df3d991bccb5ee1ce47b

  • SHA512

    22b3afbcef85484ce1a747c45345ce2c605116f2695991fd3d22a3d0916d64948dc90b189a3c3a4585827243e03cda4d399961516015b06f14e3a6bcba2a2a1c

  • SSDEEP

    49152:oJ3yaMQKEJffoKvKjkBzqhaDd8RigNmP6RpghkMTqZ40pwicMvt17eFoq4RH3AT8:IhKEJfg0K1pNmP+pqTW4tkvtEs3ATIF

Malware Config

Extracted

Family

octo

C2

https://zzd768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://22d768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://34d768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://as4d768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://4d768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://44768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://466db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

rc4.plain

Extracted

Family

octo

C2

https://zzd768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://22d768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://34d768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://as4d768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://4d768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://44768db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

https://466db37e5e2f5a7fbc0fe1fee5b311.com/YzhkZjQwNDRkN2Uy/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.seeidea54
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4315

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.seeidea54/cache/chjlgwivk

    Filesize

    2.3MB

    MD5

    d923315d7894e4e9e91da21f5726555d

    SHA1

    dfdde912776ead97805aaed52c1a029dbefc905b

    SHA256

    c07644ad711937e2844f340ae327360f0a2fa0f0377628b59b5261afd1c470ec

    SHA512

    9f6a45b88630852147fc302681760aca8a733278f175ecd3d04e5cd0e977a6cdd8089026435e809e9af87b4f6cb7488385e225ef5523e9300ca975e1729b328c

  • /data/data/com.seeidea54/cache/oat/chjlgwivk.cur.prof

    Filesize

    535B

    MD5

    97890b1dbbdf3d59c4e2ff3feb479b64

    SHA1

    c68f326c809a54f461c46173db70ef364740cb75

    SHA256

    f6e3749406a9bc96837b128fa03faa6553d303aad5d5643711ac0889ca2cf702

    SHA512

    44351f53dc99781190a5ec020149dc50c129fb08483ed0c54d9fe82bdb83f06ad7b24d4e49eae8d2574ea3402b114d379895dd4fa5aaa7c238150f2f84715193

  • /data/data/com.seeidea54/kl.txt

    Filesize

    65B

    MD5

    4af6de99416d5d711fb2e4812fc8f6b5

    SHA1

    29246a8cb0326e4be6c736de49cb9d1afb73cbcb

    SHA256

    60eb3cdc6f0b23c7b5f46a008a2e56aca064b876d288fef4d910d8dcb40b6641

    SHA512

    8769a63852a0da0231e9ff689e355c4838dfaa19a0b61b0a5db5eb9d242994df029a6010f40d1c4dbb9b746af85ee481237a822f2b9d7c555dedde211845a4db