Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    21-12-2024 22:14

General

  • Target

    ead9f9ebe2e50d869fa82f5ede306c2c9ab89d94f4457e8388201786e12c05c4.apk

  • Size

    1.2MB

  • MD5

    eee4ed4095f0998c7a5ffe7beed509be

  • SHA1

    d61dd19f460238a13050ba0b0336bd137f22b147

  • SHA256

    ead9f9ebe2e50d869fa82f5ede306c2c9ab89d94f4457e8388201786e12c05c4

  • SHA512

    af408ee4d3d41bc8aef51decfd27a4b8b1561a443b3ffe17a9cc8ded4e251401b7efeb73c1c80c3554592cdd124d46b4fc72889ce8dab76648fa92c09c8c50e1

  • SSDEEP

    24576:KhszzJltPKfD0FWe2wlESB5O83oevBY6dUB/wSmjSEwdjqkD:K+zVKf2W2lXBM41vBJUtwQrdZ

Malware Config

Extracted

Family

octo

C2

https://94.156.65.160/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.net/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.com/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.xyz/ODRiMzk3Njg3ZThk/

https://scorpionxxxtentionss.net/ODRiMzk3Njg3ZThk/

rc4.plain

Extracted

Family

octo

C2

https://94.156.65.160/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.net/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.com/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.xyz/ODRiMzk3Njg3ZThk/

https://scorpionxxxtentionss.net/ODRiMzk3Njg3ZThk/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.sciencesecondwv
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4457

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.sciencesecondwv/cache/mvitnhnsc

    Filesize

    449KB

    MD5

    16bd306b6399964802d5d472eb9c83ec

    SHA1

    901489045df822f6e137f4d4203685608369ee1a

    SHA256

    6868cc3acc45d2840cf8ec6be37cc789c7a187811c0146f8ee1eb6687ec4c542

    SHA512

    51850b4bc333188baa260ddd2a21ca2c9175412e428ec618ea190b8e6e9aaaa28495bbd1b81107946ff8f81baa4f6083cc1907b08c6f28ccf72508a58285d074

  • /data/user/0/com.sciencesecondwv/cache/oat/mvitnhnsc.cur.prof

    Filesize

    294B

    MD5

    53f6db3f2fccb7c1598268aad28a75c4

    SHA1

    ec6ebbf8c665e09406ff3500b36a480b7893a783

    SHA256

    8690cf227f924dad262c370fa07d13580133c8d13dfaba6eb5cfd3725ca00105

    SHA512

    85cebe292dc400d3017444fc7b95e5f5470b86a303f6cbd52f1f1635e237e9d6f5cb86d8cd077db849e653daa9daac827a1e329d7417323f4d40449a5bccedff