Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
21-12-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
515cb9c6a63a53600e452e3c00dc7c180d4b7730a1129ed4140a16e313da55f2.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
515cb9c6a63a53600e452e3c00dc7c180d4b7730a1129ed4140a16e313da55f2.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
515cb9c6a63a53600e452e3c00dc7c180d4b7730a1129ed4140a16e313da55f2.apk
-
Size
1.7MB
-
MD5
bb78aeab4571b00bd9ac78b4c1931fec
-
SHA1
69fce23a408f42f09a2e433335eff614622c380b
-
SHA256
515cb9c6a63a53600e452e3c00dc7c180d4b7730a1129ed4140a16e313da55f2
-
SHA512
78ad08a0efe2e23408acaaab7484d95933b7ebee6ee6cbc31acf6e233fec6bc69705afb6a28725db759dfa4a06a13a242a9215199aaf6c70571337714530443a
-
SSDEEP
49152:t2Fq7f5ao6T+7d/jd6VfmbYcZd+8TvbwHNEWOXyX6:cFWfL6M6Vf8YK+8b0nKyK
Malware Config
Extracted
octo
https://cosmosalienadventures.xyz/YmJlYTFiODdkMjcz/
https://intergalacticvoyages.xyz/YmJlYTFiODdkMjcz/
https://stellarexplorations.xyz/YmJlYTFiODdkMjcz/
https://quantumspaceodyssey.xyz/YmJlYTFiODdkMjcz/
https://extraterrestrialhub.xyz/YmJlYTFiODdkMjcz/
https://nebularresearchlabs.xyz/YmJlYTFiODdkMjcz/
https://cosmicfrontiersquad.xyz/YmJlYTFiODdkMjcz/
https://andromedamissions.xyz/YmJlYTFiODdkMjcz/
https://orbitalknowledgenet.xyz/YmJlYTFiODdkMjcz/
https://aliencivilizations.xyz/YmJlYTFiODdkMjcz/
https://celestialinventions.xyz/YmJlYTFiODdkMjcz/
https://astralnavigationxyz.xyz/YmJlYTFiODdkMjcz/
https://galacticcodexbase.xyz/YmJlYTFiODdkMjcz/
https://proximaexpedition.xyz/YmJlYTFiODdkMjcz/
https://universespectrum.xyz/YmJlYTFiODdkMjcz/
https://keplerinfinityteam.xyz/YmJlYTFiODdkMjcz/
https://astronomicalpioneers.xyz/YmJlYTFiODdkMjcz/
https://xenoscientificera.xyz/YmJlYTFiODdkMjcz/
https://orbitalscientists.xyz/YmJlYTFiODdkMjcz/
https://cosmicventurespro.xyz/YmJlYTFiODdkMjcz/
Extracted
octo
https://cosmosalienadventures.xyz/YmJlYTFiODdkMjcz/
https://intergalacticvoyages.xyz/YmJlYTFiODdkMjcz/
https://stellarexplorations.xyz/YmJlYTFiODdkMjcz/
https://quantumspaceodyssey.xyz/YmJlYTFiODdkMjcz/
https://extraterrestrialhub.xyz/YmJlYTFiODdkMjcz/
https://nebularresearchlabs.xyz/YmJlYTFiODdkMjcz/
https://cosmicfrontiersquad.xyz/YmJlYTFiODdkMjcz/
https://andromedamissions.xyz/YmJlYTFiODdkMjcz/
https://orbitalknowledgenet.xyz/YmJlYTFiODdkMjcz/
https://aliencivilizations.xyz/YmJlYTFiODdkMjcz/
https://celestialinventions.xyz/YmJlYTFiODdkMjcz/
https://astralnavigationxyz.xyz/YmJlYTFiODdkMjcz/
https://galacticcodexbase.xyz/YmJlYTFiODdkMjcz/
https://proximaexpedition.xyz/YmJlYTFiODdkMjcz/
https://universespectrum.xyz/YmJlYTFiODdkMjcz/
https://keplerinfinityteam.xyz/YmJlYTFiODdkMjcz/
https://astronomicalpioneers.xyz/YmJlYTFiODdkMjcz/
https://xenoscientificera.xyz/YmJlYTFiODdkMjcz/
https://orbitalscientists.xyz/YmJlYTFiODdkMjcz/
https://cosmicventurespro.xyz/YmJlYTFiODdkMjcz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 2 IoCs
resource yara_rule behavioral1/memory/4400-0.dex family_octo behavioral1/memory/4374-0.dex family_octo -
pid Process 4374 com.absent.pave -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.absent.pave/app_blue/KWm.json 4400 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.absent.pave/app_blue/KWm.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.absent.pave/app_blue/oat/x86/KWm.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.absent.pave/app_blue/KWm.json 4374 com.absent.pave -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.absent.pave Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.absent.pave -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.absent.pave -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.absent.pave -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.absent.pave android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.absent.pave android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.absent.pave android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.absent.pave -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.absent.pave -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.absent.pave -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.absent.pave -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.absent.pave -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.absent.pave -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.absent.pave
Processes
-
com.absent.pave1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4374 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.absent.pave/app_blue/KWm.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.absent.pave/app_blue/oat/x86/KWm.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4400
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD51143394b4a6a8a775a9a75b729f45cf0
SHA118673028acfb57393d16671d130aae442e98c393
SHA2569695f3241876036fd9ba8f96fa556e17ec368c54f9b36304a628e2ca4ae01ee0
SHA512b249962380c55aad02b8a82278dbf96676266af269f71da1f0b4bb56003526a89d211d12bc05974b0d3fcf253c30a77dbb66f3361456120c46b7e6c161df3ff8
-
Filesize
153KB
MD50536cf707dfe500d497de8250c231b3d
SHA1380ec916016061263e76d1b9fe680ec8bed47f0a
SHA256be039278bb5702c472c80a7e2611a5b064155109437262aa0841e7f8047eb90e
SHA512fa1201d4cb5595194cedea29611bb42c376627732b26de5234ecd9285c579276896a7c216031f2203557e877251be91ad7c963b4347345c7d3dfae93027bd8ab
-
Filesize
450KB
MD532cad99065d3ba1161149aac6a1e32aa
SHA18b153d582a1e58ea6ff0ba7084ac25e04a160e0d
SHA256bf27c5528c6352e9a81607cb3b00b36f8bd7ea32ee3755a446cec955f471412c
SHA512667756257668afcfe90d61060a9bf91793e3a9ca32819dff2820259fe22b45943e29168f390b5053b9314d4b67b2848c288ac598ec61430a5965b4282fa15f54
-
Filesize
450KB
MD552518a6bd7ab34e4d16e1c4ea2509213
SHA12233ae8c3234e768786af19f7376941a492fede8
SHA256d3b3bc02ce2add9d777cd39dd1248495de3c45892f4b7eb195a4f6e825d0d040
SHA5120d61533beab28b95856947b72556a360bbb99671e0fbe15552e40449313e0ef5002e9b671eaf470d1e88f7c4c254ee1935e9e50ac3425009d7e261582b5e87e3