Analysis
-
max time kernel
29s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
16-12-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
606e532d798ab338612571cfd2b77c457dbbd30008892fcd68aa4d86dc9d5cba.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
606e532d798ab338612571cfd2b77c457dbbd30008892fcd68aa4d86dc9d5cba.apk
Resource
android-x64-20240624-en
General
-
Target
606e532d798ab338612571cfd2b77c457dbbd30008892fcd68aa4d86dc9d5cba.apk
-
Size
4.8MB
-
MD5
aa49563023b15e8d6777186f2ee46362
-
SHA1
e3cb25e37bb807fec184c10c987a735452b67805
-
SHA256
606e532d798ab338612571cfd2b77c457dbbd30008892fcd68aa4d86dc9d5cba
-
SHA512
8db1eeac283f67d4d716703787b0c9ba2fa1d451d33254d9cd240dcbf904cba45fac8c8fa4979e2b692259f9f52257808b1903805a247623addb19bb8ff34086
-
SSDEEP
49152:zRsEXEqBKbk3XqT45iS7xrGAz0wOlDjVKSc/UplPPfa7LdxIgx5nukHJ9:zRs2Bik3XJ5iSRGv/VKZeyXdxRvd
Malware Config
Extracted
octo
https://fcb4483ab1b9ad5463a0bb11231c33f0.xyz
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4938-0.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.soundcapturets0/[email protected] 4938 com.soundcapturets0 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.soundcapturets0 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.soundcapturets0 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.soundcapturets0 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.soundcapturets0 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.soundcapturets0 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.soundcapturets0 -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.soundcapturets0 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.soundcapturets0 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.soundcapturets0 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.soundcapturets0
Processes
-
com.soundcapturets01⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4938
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
322KB
MD577dc50489b9323274732d27dc8a4e803
SHA10e02a3595b62489d0739d771881da8604d117c65
SHA256c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820
SHA5120684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58
-
/data/data/com.soundcapturets0/oat/x86_64/[email protected]
Filesize162B
MD54c9e85017c2ce32608bf353f2312b13c
SHA1f9d13559838c1d3841d0c2373f17ebd302ff753b
SHA256707ce880e816e2109a59b6d7fdc12e5b90fa41177147893783cfdc0392bfb5f9
SHA512edea90475068d8b01d4ab5720e0513e89af87ee5c16fef3fb1e4552721e92db0b963dd775adaf1ae3a303c38b25a31ec3222ad9fce5b0c2f2bd0ff75f51a4259
-
/data/user/0/com.soundcapturets0/[email protected]
Filesize525KB
MD5f12e1d3043385f791b643cf6c395d4f2
SHA1f2053a0b5ce34b4d091a63852b17670b8b5c42e8
SHA2564a18889756eed9079528b63f673eda3a1dab498e31c2aa4849d5bfc6ce2458f9
SHA512a5b34f7bdadbc7b50d80743cbfb95147a116457c8c616bc672b1551b3c483c2bab0c8c6ed56818836442e7d3273d1e0c7ec15c5bba50703909191e8e0826a825