Analysis

  • max time kernel
    29s
  • max time network
    37s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    16-12-2024 04:02

General

  • Target

    370c44d79a503fcfc41060a6cc567d1e93c419c41fc04b8169516204578b96e7.apk

  • Size

    3.5MB

  • MD5

    42305a4586640e91c21dd72bdff55bb5

  • SHA1

    c462208e1117e88e41d5e4d71509f0ffaf6ed6df

  • SHA256

    370c44d79a503fcfc41060a6cc567d1e93c419c41fc04b8169516204578b96e7

  • SHA512

    ca2cdb1087ca6d53c3a0b669fa28534411e9d054d8a659ccb90e37450435430dce928a51da716888fe1994cb4599df8ff9094d6be13bb7ba1564d19692863666

  • SSDEEP

    98304:gukWXLjQGrAmA9tnkgjOfd8kWG89oiEKQqBNvxjTPPJ:F8I3WGcoNKQIPJ

Malware Config

Extracted

Family

octo

C2

https://biribizidurdursun310.xyz/NTQzZmI0YTdmMjNl/

https://biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/

https://3biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/

https://4biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/

https://5biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/

https://5biribizidurdursun361.net/NTQzZmI0YTdmMjNl/

https://5biribizidurdursun536.com/NTQzZmI0YTdmMjNl/

rc4.plain

Extracted

Family

octo

C2

https://biribizidurdursun310.xyz/NTQzZmI0YTdmMjNl/

https://biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/

https://3biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/

https://4biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/

https://5biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/

https://5biribizidurdursun361.net/NTQzZmI0YTdmMjNl/

https://5biribizidurdursun536.com/NTQzZmI0YTdmMjNl/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.oftensomeicxc
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4225
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.oftensomeicxc/app_comfort/Yjaq.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.oftensomeicxc/app_comfort/oat/x86/Yjaq.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4251

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.oftensomeicxc/app_comfort/Yjaq.json

    Filesize

    1KB

    MD5

    c64864119c7ee5f9debd606f51fbbc46

    SHA1

    0e0f5aefeb54bc25d4d2b50c16e0888d5b9d7d86

    SHA256

    81299f091849bde782682c8a4c7fe30f2651ac5a7860e733e7d5e58622441446

    SHA512

    302fc045b89962a51e10e5143a0733ea72f46a0ebde50231b121de07b397cf1d370b8a3eb8b75313757836b33dfaa4064ac07181253fde3a538033fc98eebacb

  • /data/data/com.oftensomeicxc/app_comfort/Yjaq.json

    Filesize

    1KB

    MD5

    8677544e8b9160020bd1f10ac08a9e06

    SHA1

    ca7a437df4bdddb203ec5b1d1288d65b4460a032

    SHA256

    c9f6c98e1334839b099e7f1048fcdbc14573c7fee3e0b962517672c470494662

    SHA512

    bb7dfcf809775225c3a4b5a158ef72267130b89814024f528669446db25510273872e2f27b3b5417a71baddb65fd6aa0c4b78e30ea5e436ba39402cef3e85424

  • /data/data/com.oftensomeicxc/cache/abgpytiyxdgrm

    Filesize

    449KB

    MD5

    9b45e7dcf1b8ee3d519b2bc82bd96fad

    SHA1

    b8956163c2aa3ad2f789b4b22165efa3e4e7906f

    SHA256

    e44ede663af808cb25c9c80df13798e87b7baf79cca435ec16f60ea8c9c9752b

    SHA512

    1cc3b08b844dd358d8cefe74281c4e558bae8dadf18c905bace41a69ab0a228f26ac170bbadaaccc21f9e4f7e22b21feebbb937243fa0d04919a1e5d1268ee39

  • /data/user/0/com.oftensomeicxc/app_comfort/Yjaq.json

    Filesize

    2KB

    MD5

    469188bda53a11d3a982c38bd97c6106

    SHA1

    ba02e2eb861a2234823b3cf2d5d5c4ca6939cc04

    SHA256

    f6e6b6f41c64f89568e44be83d3f9fb516787e52f123fed542d7fec8d7ddcf68

    SHA512

    8f91d31bd28581c1b3e9dfd2455f3546ee7ea7ae568616774e4dbe47a9ecdc33ec4fffb98421c7a442cf5fa226290d9d0bb78d7bdb8111232ef988866b812462

  • /data/user/0/com.oftensomeicxc/app_comfort/Yjaq.json

    Filesize

    2KB

    MD5

    a93217e54831c3b516d81819a8400ffd

    SHA1

    cbd0abf02b57e063ee6610eff8498f79cb89e86e

    SHA256

    321ff82cc4dcf9168de5c032657f0fe4a5267d8237268dc85c7564d58c71c68c

    SHA512

    c487d9b0da9d30b63ae54b98727c66fb74db0a08fc26a078a800a29f46a3d4528999165e8723d41a46ba7da5b6e1b4a259e01185be3f487b0ff90d17260004f8