Analysis

  • max time kernel
    58s
  • max time network
    133s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    17-12-2024 22:09

General

  • Target

    17f75e1fc2e3ba668902e87ccbf07b8b41ec04562d8b93cf58e7154de76fe767.apk

  • Size

    1.3MB

  • MD5

    090491ca4ebf3f37ae1ce745950f8990

  • SHA1

    71e031c502bd84610bb520c856f05095046376a5

  • SHA256

    17f75e1fc2e3ba668902e87ccbf07b8b41ec04562d8b93cf58e7154de76fe767

  • SHA512

    e4493f157539cddb78d45711f70af8b5d08f9e64c9578f850f86660539891e7d3066bc190412616fe8835b52409bf180c8e9591f00aaaa572375d3cd46832d39

  • SSDEEP

    24576:5fsl36W7cUdVm1/pAy+jwqLKS9vA2vQYIzAp2BC/fN/1MBkgTtPsMuLsF:q++VmbQjzKWrZIzAwB2fHMBBTtPssF

Malware Config

Extracted

Family

octo

C2

https://hayatvesanatguzellikduygusu.xyz/YmJlYTFiODdkMjcz/

https://mutlulukvesessizlikyolculugu.xyz/YmJlYTFiODdkMjcz/

https://yasamvesahtekarguzellik.xyz/YmJlYTFiODdkMjcz/

https://sevincligunlertatminkar.xyz/YmJlYTFiODdkMjcz/

https://dogaltatvesanatyaklasimi.xyz/YmJlYTFiODdkMjcz/

https://hayatlarinhuzurvesessiz.xyz/YmJlYTFiODdkMjcz/

https://keyifligunlerinfirsatlari.xyz/YmJlYTFiODdkMjcz/

https://sevgiiledoluyasamyolu.xyz/YmJlYTFiODdkMjcz/

https://sakinlikvehayatderinligi.xyz/YmJlYTFiODdkMjcz/

https://sanatvesanatcihayatlari.xyz/YmJlYTFiODdkMjcz/

https://ilhamdolubirhayat.xyz/YmJlYTFiODdkMjcz/

https://zenginlikvebasarihikayesi.xyz/YmJlYTFiODdkMjcz/

https://kalpvesanatdostlukhikaye.xyz/YmJlYTFiODdkMjcz/

https://mutlugunlerinyasamayolu.xyz/YmJlYTFiODdkMjcz/

https://yasananhayatinduygular.xyz/YmJlYTFiODdkMjcz/

https://dogaylaisbirligiyolu.xyz/YmJlYTFiODdkMjcz/

https://hosgoruhayatvekultur.xyz/YmJlYTFiODdkMjcz/

https://hayalguclesanatbaglantisi.xyz/YmJlYTFiODdkMjcz/

https://sadelikvehayatfelsefesi.xyz/YmJlYTFiODdkMjcz/

https://dogaldostlukvesanat.xyz/YmJlYTFiODdkMjcz/

rc4.plain

Extracted

Family

octo

C2

https://hayatvesanatguzellikduygusu.xyz/YmJlYTFiODdkMjcz/

https://mutlulukvesessizlikyolculugu.xyz/YmJlYTFiODdkMjcz/

https://yasamvesahtekarguzellik.xyz/YmJlYTFiODdkMjcz/

https://sevincligunlertatminkar.xyz/YmJlYTFiODdkMjcz/

https://dogaltatvesanatyaklasimi.xyz/YmJlYTFiODdkMjcz/

https://hayatlarinhuzurvesessiz.xyz/YmJlYTFiODdkMjcz/

https://keyifligunlerinfirsatlari.xyz/YmJlYTFiODdkMjcz/

https://sevgiiledoluyasamyolu.xyz/YmJlYTFiODdkMjcz/

https://sakinlikvehayatderinligi.xyz/YmJlYTFiODdkMjcz/

https://sanatvesanatcihayatlari.xyz/YmJlYTFiODdkMjcz/

https://ilhamdolubirhayat.xyz/YmJlYTFiODdkMjcz/

https://zenginlikvebasarihikayesi.xyz/YmJlYTFiODdkMjcz/

https://kalpvesanatdostlukhikaye.xyz/YmJlYTFiODdkMjcz/

https://mutlugunlerinyasamayolu.xyz/YmJlYTFiODdkMjcz/

https://yasananhayatinduygular.xyz/YmJlYTFiODdkMjcz/

https://dogaylaisbirligiyolu.xyz/YmJlYTFiODdkMjcz/

https://hosgoruhayatvekultur.xyz/YmJlYTFiODdkMjcz/

https://hayalguclesanatbaglantisi.xyz/YmJlYTFiODdkMjcz/

https://sadelikvehayatfelsefesi.xyz/YmJlYTFiODdkMjcz/

https://dogaldostlukvesanat.xyz/YmJlYTFiODdkMjcz/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.delay.sniff
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4249
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.delay.sniff/app_brick/NUFFpjS.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.delay.sniff/app_brick/oat/x86/NUFFpjS.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4275

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.delay.sniff/app_brick/NUFFpjS.json

    Filesize

    153KB

    MD5

    ece7de5bb246a4351d65a3ee0d503c13

    SHA1

    a2a4a101b4935e49ebc2e662c9083edf9dcec85c

    SHA256

    deeedc3625185b2f84c12a8545917a793de0dba62cd6cf5d56d24fa4e4e73aaa

    SHA512

    66de5e2e4a5a06c9f87694331313c0c8a805492565014f2f230b3b5b10d9a812968e0d75ca3cd4eed5c142e304d492c427e6ae601bbf23fb3553338be89a5ad5

  • /data/data/com.delay.sniff/app_brick/NUFFpjS.json

    Filesize

    153KB

    MD5

    d144608c0448738c0195bc4f5333f69e

    SHA1

    9a438c9f1bff3fd31b1ef707c761d9c07930e8f6

    SHA256

    e76f5f8af353de0ec905dfd4eedad7211ff91a469cb417a25fbcf863c6a8971c

    SHA512

    8dbd99be47890343a4f6d66fe6084baeb88295fc2123cdcc01591dff3d520aae4ccc9429be8746cae595dd463433745298241970161846ed1ff91fdb494c7d6f

  • /data/user/0/com.delay.sniff/app_brick/NUFFpjS.json

    Filesize

    451KB

    MD5

    f05c85fc167a6e3f0ac60b83f45e2152

    SHA1

    bf40cb99e65beb608bb7fba23dc329545050b0b8

    SHA256

    abb315a411523560044413860b047acb4ee67aa4084172a1dd28e021cd6fc86e

    SHA512

    30b2f8fbd9b1d6220a8b102f4b6f3bb9b883b9c48f941d487b2f121c5c6b87cccb39e148fdb72f13145e16e50497b322dba2c3dcc2fef37cec6e962a76ded6f0

  • /data/user/0/com.delay.sniff/app_brick/NUFFpjS.json

    Filesize

    451KB

    MD5

    1cac5ff15b8e9a569b0f794bfb780b92

    SHA1

    23be3b59a2fd7cf779f7bf144093933a42a584f1

    SHA256

    757eee14b0cf15e996aebe523a607c74b3d2f5773dceded50b1eade4fa47fc31

    SHA512

    832a92ea16f19cacec953b4a4d61b39fe8f06c2580bb9c0c9526398450c7ae2365345e779f3f9b9531f688fa3dbad35719dc0504bc8218fbfdba6b8f8515ee32