Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    19-12-2024 22:00

General

  • Target

    7abe8922680dae65d78255e5e473c8eb783566557f8ec86f9012a01b1786e551.apk

  • Size

    2.0MB

  • MD5

    b9a3825e1bc3eba58aa8acb324fb9f97

  • SHA1

    d48dae83ea9293724a5b20ab6eb067fea2ab50ce

  • SHA256

    7abe8922680dae65d78255e5e473c8eb783566557f8ec86f9012a01b1786e551

  • SHA512

    32c649214892894a446b051f011db58e5370132d956bd788156886010b012890cbe9611bf7a4c81887e22f176099ed1371351753a3a00dfda16dfb48b8caa415

  • SSDEEP

    49152:vWFVb6i/SQz5DXfBpVkJsj61/ZiZsezXHmWKPYH8:vKVb6i6QNDSf12sIrcT

Malware Config

Extracted

Family

octo

C2

https://cosmosalienadventures.xyz/YmJlYTFiODdkMjcz/

https://intergalacticvoyages.xyz/YmJlYTFiODdkMjcz/

https://stellarexplorations.xyz/YmJlYTFiODdkMjcz/

https://quantumspaceodyssey.xyz/YmJlYTFiODdkMjcz/

https://extraterrestrialhub.xyz/YmJlYTFiODdkMjcz/

https://nebularresearchlabs.xyz/YmJlYTFiODdkMjcz/

https://cosmicfrontiersquad.xyz/YmJlYTFiODdkMjcz/

https://andromedamissions.xyz/YmJlYTFiODdkMjcz/

https://orbitalknowledgenet.xyz/YmJlYTFiODdkMjcz/

https://aliencivilizations.xyz/YmJlYTFiODdkMjcz/

https://celestialinventions.xyz/YmJlYTFiODdkMjcz/

https://astralnavigationxyz.xyz/YmJlYTFiODdkMjcz/

https://galacticcodexbase.xyz/YmJlYTFiODdkMjcz/

https://proximaexpedition.xyz/YmJlYTFiODdkMjcz/

https://universespectrum.xyz/YmJlYTFiODdkMjcz/

https://keplerinfinityteam.xyz/YmJlYTFiODdkMjcz/

https://astronomicalpioneers.xyz/YmJlYTFiODdkMjcz/

https://xenoscientificera.xyz/YmJlYTFiODdkMjcz/

https://orbitalscientists.xyz/YmJlYTFiODdkMjcz/

https://cosmicventurespro.xyz/YmJlYTFiODdkMjcz/

rc4.plain

Extracted

Family

octo

C2

https://cosmosalienadventures.xyz/YmJlYTFiODdkMjcz/

https://intergalacticvoyages.xyz/YmJlYTFiODdkMjcz/

https://stellarexplorations.xyz/YmJlYTFiODdkMjcz/

https://quantumspaceodyssey.xyz/YmJlYTFiODdkMjcz/

https://extraterrestrialhub.xyz/YmJlYTFiODdkMjcz/

https://nebularresearchlabs.xyz/YmJlYTFiODdkMjcz/

https://cosmicfrontiersquad.xyz/YmJlYTFiODdkMjcz/

https://andromedamissions.xyz/YmJlYTFiODdkMjcz/

https://orbitalknowledgenet.xyz/YmJlYTFiODdkMjcz/

https://aliencivilizations.xyz/YmJlYTFiODdkMjcz/

https://celestialinventions.xyz/YmJlYTFiODdkMjcz/

https://astralnavigationxyz.xyz/YmJlYTFiODdkMjcz/

https://galacticcodexbase.xyz/YmJlYTFiODdkMjcz/

https://proximaexpedition.xyz/YmJlYTFiODdkMjcz/

https://universespectrum.xyz/YmJlYTFiODdkMjcz/

https://keplerinfinityteam.xyz/YmJlYTFiODdkMjcz/

https://astronomicalpioneers.xyz/YmJlYTFiODdkMjcz/

https://xenoscientificera.xyz/YmJlYTFiODdkMjcz/

https://orbitalscientists.xyz/YmJlYTFiODdkMjcz/

https://cosmicventurespro.xyz/YmJlYTFiODdkMjcz/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.material.anger
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4216

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.material.anger/app_blossom/oFADO.json

    Filesize

    153KB

    MD5

    1c03befecdff8955aafe43f828f62053

    SHA1

    cb365bdde73bba1b192ab03b35f7afcfa14da808

    SHA256

    83711d95891e8c24866db33c0be527a94783a3a14b43697b2f6ec5a15e4d7baa

    SHA512

    1d3c2df47bcd6f81134deda75d83173f73e324ce59cc50c35374cb575906fca177d9beac5b7a2808b13d36526eac5678d932f411314503cfa1ac002c756f003c

  • /data/data/com.material.anger/app_blossom/oFADO.json

    Filesize

    153KB

    MD5

    c73c7ce978a7062d760131ea0e6164a8

    SHA1

    16775999caacea1ee0cefc0771dfa5ccf0b71069

    SHA256

    53f502b2abfe20894df185ab4b87236bbdfd250239170f572537f6ebdfe7b7e7

    SHA512

    cbd392d042426692391d521e5e7224657dd7d5e56afcb578c603ee378d3f33120daeaf078bd426e9dacf48a217653c5765dd965c54c5552fe73460485564c0d7

  • /data/user/0/com.material.anger/app_blossom/oFADO.json

    Filesize

    450KB

    MD5

    b2e609219b39e4537c4b67faed8efa92

    SHA1

    be14240044a781025ad92c921df2d81fdd117960

    SHA256

    c22cc190a6fc38baa2574d2b171f1f9d67b7b8146ed7257bbff8bfda8c844623

    SHA512

    7615d933a64a21aa2543ea099c04945739561b51cb4bdc9ffe0a06ccb6e8f6b8e0cc722163e59089cdf3a0b77e6ca427f5a922d664ea0a2fd3e164b10323f809