Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
119s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
10/12/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
134f0aec5d98c54cb4937fc8e0f0f6f2962a64d1b5ba016253b1143e9fb6d5cb.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
134f0aec5d98c54cb4937fc8e0f0f6f2962a64d1b5ba016253b1143e9fb6d5cb.apk
Resource
android-x64-20240910-en
General
-
Target
134f0aec5d98c54cb4937fc8e0f0f6f2962a64d1b5ba016253b1143e9fb6d5cb.apk
-
Size
4.7MB
-
MD5
f89be21b6a36fe0d868a8e354a1c317b
-
SHA1
0a156dcc075436ea41efdf6645147dd1b825f5d2
-
SHA256
134f0aec5d98c54cb4937fc8e0f0f6f2962a64d1b5ba016253b1143e9fb6d5cb
-
SHA512
3060fab7a621a514d4f6886d95df4d297e2bef79483bb1ae03d2f2cb953f0dc0ef15fbe856ae18fcef698d0194987dde70f524beb5b7978e476d90077da5937c
-
SSDEEP
98304:kLdnmILTxZH5NnHuJNByPQAJppjG2bYn1tcKlmp/pHjCTzZ3xG9WpR6b3gNqPE:kXLld333jGQg1tcKlYDCTzdxG9WUpE
Malware Config
Extracted
octo
https://pildirpirpir34.com/ZTZkODUzMTBjYTA3/
https://pidlirmidlir23.com/ZTZkODUzMTBjYTA3/
https://pigav233.com/ZTZkODUzMTBjYTA3/
https://tavaekemk42com/ZTZkODUzMTBjYTA3/
https://pifvafaf42e42.site/ZTZkODUzMTBjYTA3/
Extracted
octo
https://pildirpirpir34.com/ZTZkODUzMTBjYTA3/
https://pidlirmidlir23.com/ZTZkODUzMTBjYTA3/
https://pigav233.com/ZTZkODUzMTBjYTA3/
https://tavaekemk42com/ZTZkODUzMTBjYTA3/
https://pifvafaf42e42.site/ZTZkODUzMTBjYTA3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-7.dat family_octo -
pid Process 4258 com.mayonejbir -
Loads dropped Dex/Jar 1 TTPs 5 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mayonejbir/app_dex/classes.dex 4258 com.mayonejbir /data/user/0/com.mayonejbir/app_dex/classes.dex 4284 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mayonejbir/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mayonejbir/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.mayonejbir/app_dex/classes.dex 4258 com.mayonejbir /data/user/0/com.mayonejbir/cache/htutdowamwb 4258 com.mayonejbir /data/user/0/com.mayonejbir/cache/htutdowamwb 4258 com.mayonejbir -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mayonejbir Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mayonejbir -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mayonejbir -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mayonejbir -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mayonejbir android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mayonejbir android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mayonejbir android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mayonejbir -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mayonejbir -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.mayonejbir -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.mayonejbir -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.mayonejbir -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mayonejbir -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mayonejbir
Processes
-
com.mayonejbir1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4258 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mayonejbir/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mayonejbir/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4284
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f2596728d8826c98e91c9c460a8aa152
SHA1d6274ce7b384926ddb861611cb2638bb3ec674fe
SHA256380078de119d3ad353906370026d0c9610a0c40eaecfecfdd2f31f98daac0891
SHA5120c395fae4d31496f9dc5f54a2e24196c0b9f8470e6406e25e6ef269dc4ce4c3624908f3a47d9b259d12c7f35e58d79d97f8a229907338f1e35fd591c627b5857
-
Filesize
1KB
MD570fa8e3c7bd51f77db75734a75c879ef
SHA1eb71e69a8db41c788d0bf4f229357291d442328a
SHA2564b269248b82fe021bc493ef236d37675c44ceecfed4642c18d197d121ac42cea
SHA512bee9c8180647094c0711327e7f6ea6318121978d342a3bd878ff6ff4b98ed967056b7dc73002b1f2693b6433f288a4f9a1eb89fd19938de05c7b34bc0548d765
-
Filesize
1KB
MD5aaaa2909023dcf52364a28daf9bc6d6d
SHA1dcc3fb549e1d1fff09129e2668c3568440dd7259
SHA25666e5c8fe321e6bee4e7dcd8d8b90716dd0d8d678938f68027222d45b1f9c4655
SHA512c5e0fc921bdc6742a94604fd8a8eb914f11a271749a7bdee5cc5f3e857e3ac61389178676669b50cfda819197ec6cc763c2ffee0d38283222fd31d3d1293a420
-
Filesize
1.4MB
MD583fc0ec9c6eb53f350001ca2af8b8779
SHA13bd9cb6f9af7025cee2a0d6b53fa78b3755ee9a4
SHA256ca9fa7b04a11c8f580bd3a87b182f7a11dca7182b0d2d0e8f1331d2a4ee2a05e
SHA5124b301bf0f4236a5ecfd5dc52598d041e3a7f7b7ea5a227d6358cc1bf4dad430cb0eb18b20c78879fa6efb17431fd6026da2becaad8cc6d3d6e961b887834c80a
-
Filesize
3KB
MD55da18a81eb2be445d1670a5bed5c435a
SHA169529e7f53a004f3b15faddaaa3c3de53a631b7c
SHA2569bf9b8c1b3cf5ed32be89986702f26d8ce4d6007479eafef9ebbcc10ef315b71
SHA512921db9b78c115eec81428badf570be36c1424260ab0a68848ab02079f3678964e4a6c20c7bf724675e321edc9dc6af2a4791605340adca708b5242acb3575185