Analysis
-
max time kernel
149s -
max time network
152s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
24-12-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
dd9ee2c4eb65c7ee40647b8cf716fa4817f258bf81ee32478c536ba06cb1f8f5.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
dd9ee2c4eb65c7ee40647b8cf716fa4817f258bf81ee32478c536ba06cb1f8f5.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
dd9ee2c4eb65c7ee40647b8cf716fa4817f258bf81ee32478c536ba06cb1f8f5.apk
-
Size
3.1MB
-
MD5
35fcb435681f4268c10d5d474691b899
-
SHA1
08bee80094047cb829f600f6b746bec6df15f413
-
SHA256
dd9ee2c4eb65c7ee40647b8cf716fa4817f258bf81ee32478c536ba06cb1f8f5
-
SHA512
20cabb5c2d7761a4f1ff0a635dc20bd4f576fa7894f5f0224af21393eafb67f9fdee8fb229f12a05c3b7786df7dd5471a462d02f0a073812df3dfcc232e10e39
-
SSDEEP
98304:/y3fuaCrREh+JwpqvvnrmNszSEWomXtA46Diwu9:WfJCrREh+awHrm6OEWomXt7z9
Malware Config
Extracted
octo
https://karateustalariningizemlisan.xyz/MTk5MTQ4ZGNkMDBi/
https://karateyolcususamuraidurusu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatefelsefesininizleri.xyz/MTk5MTQ4ZGNkMDBi/
https://dojovekaretekahramanlari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatesanatvesavasustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraivekarateduruslari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatedoguveteoribilgileri.xyz/MTk5MTQ4ZGNkMDBi/
https://karateantrenmanvesanat.xyz/MTk5MTQ4ZGNkMDBi/
https://karetecininkusursuzvurus.xyz/MTk5MTQ4ZGNkMDBi/
https://kareteharaketveteknik.xyz/MTk5MTQ4ZGNkMDBi/
https://savassanatlarinindunyasi.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalaringizemlibilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://dojoyolundagecenanilar.xyz/MTk5MTQ4ZGNkMDBi/
https://karatetarihvesanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalikursunumetodu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekahramankitalarustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraikavramvesanatifelsefe.xyz/MTk5MTQ4ZGNkMDBi/
https://karateevrenselustalikbilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekapsamlisanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://dojotarihiyolundandegisime.xyz/MTk5MTQ4ZGNkMDBi/
Extracted
octo
https://karateustalariningizemlisan.xyz/MTk5MTQ4ZGNkMDBi/
https://karateyolcususamuraidurusu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatefelsefesininizleri.xyz/MTk5MTQ4ZGNkMDBi/
https://dojovekaretekahramanlari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatesanatvesavasustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraivekarateduruslari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatedoguveteoribilgileri.xyz/MTk5MTQ4ZGNkMDBi/
https://karateantrenmanvesanat.xyz/MTk5MTQ4ZGNkMDBi/
https://karetecininkusursuzvurus.xyz/MTk5MTQ4ZGNkMDBi/
https://kareteharaketveteknik.xyz/MTk5MTQ4ZGNkMDBi/
https://savassanatlarinindunyasi.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalaringizemlibilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://dojoyolundagecenanilar.xyz/MTk5MTQ4ZGNkMDBi/
https://karatetarihvesanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalikursunumetodu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekahramankitalarustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraikavramvesanatifelsefe.xyz/MTk5MTQ4ZGNkMDBi/
https://karateevrenselustalikbilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekapsamlisanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://dojotarihiyolundandegisime.xyz/MTk5MTQ4ZGNkMDBi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 2 IoCs
resource yara_rule behavioral1/memory/4249-0.dex family_octo behavioral1/memory/4224-0.dex family_octo -
pid Process 4224 com.apart.vintage -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.apart.vintage/app_frown/guYg.json 4249 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.apart.vintage/app_frown/guYg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.apart.vintage/app_frown/oat/x86/guYg.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.apart.vintage/app_frown/guYg.json 4224 com.apart.vintage -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.apart.vintage Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.apart.vintage -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.apart.vintage -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.apart.vintage -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.apart.vintage android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.apart.vintage android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.apart.vintage android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.apart.vintage -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.apart.vintage -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.apart.vintage -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.apart.vintage -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.apart.vintage -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.apart.vintage -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.apart.vintage
Processes
-
com.apart.vintage1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4224 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.apart.vintage/app_frown/guYg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.apart.vintage/app_frown/oat/x86/guYg.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4249
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5e25f88d57ae8fbebce64f5e86ec2e462
SHA1ad4e6431e6088a79fe54c4cbae9d6034c81dac61
SHA256a500c44b9ca0277bce013ab07dcf9653160d8ac751763dbaf5c6e0dcf0f330f5
SHA5128a1ce19c5d24693b5bf5335296ea6e1c3b75ff671764b07ce3d88d0557e4c54cb4b404179a9d8385053e074eb218d987bd5816179727dbf06774853f0abf8eb3
-
Filesize
153KB
MD57b4e13bfecd4bcbcea5a0106a267e2a5
SHA1a2fb6d837cfba9eeef67e1899beaa74f52036fe1
SHA2568a9fbe91fa4f9ba16ff8f8386cb8e9fb7f56c8e3a3f9aad58411a3d81f5005d1
SHA512c3fe0dfe095f1fdc8382b639fbef8fbc74004b4422e4e0181462311fb638322f3ddc3af6e2ce3e0adac6d50be3b8d1dcd22e4b1316dba21332a35988ae0a88f1
-
Filesize
451KB
MD5b58580e77dc3549c9c784999d6a3d4b3
SHA14b2013daeb0275d303be6fcd58b37924c125f5ea
SHA2561d90e8138f12b5882de61c7313d6470eee2a65985d11330f7da44d5fba43a03e
SHA512287a06f8124acf9c62ad6401eec06b93293cebdc3efd0c70af2f01e6e162b47b039aa58ec9909eab44e3ce441910c4f7aa345b6f5b661bee28258de57f95fa25
-
Filesize
451KB
MD53d11f6710a3ccba5fc676f7d9ece9e20
SHA11594570c6d69382c5e685e1ea6ea7b72b2d1866c
SHA256542052dc53c7b564d4a51cc1558581733a300c69c24c6abe49c91b4af7c4cc30
SHA512e7236bbbb0840cc68a126db4e72ee27565fd87bf8671c553830115e1612d19f3127562b6d9a51a6dccc3fb8a67e30ee5caa8ccc73e6ed47325ed77c757594a65