Analysis
-
max time kernel
149s -
max time network
164s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
24-12-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
c93bae3841ba3db6d7d8469534b824050a0c83ee93b71b56466cea42f56c9388.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
c93bae3841ba3db6d7d8469534b824050a0c83ee93b71b56466cea42f56c9388.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
c93bae3841ba3db6d7d8469534b824050a0c83ee93b71b56466cea42f56c9388.apk
-
Size
2.0MB
-
MD5
f8ad180ff7da26b4c036d193bb4c0864
-
SHA1
766a0be121631e4ec0c5233bcea13bf9cfda9692
-
SHA256
c93bae3841ba3db6d7d8469534b824050a0c83ee93b71b56466cea42f56c9388
-
SHA512
eea8794445edd5d236b2a8298cbf3912a2433329f3a81433fa525f70f825f8d9b68cf068ef2d9de9c424f90c10a6e98b4342c21bb29fd3e3c572998d15235e02
-
SSDEEP
49152:yol+O2zgodNuTl7rQ2Xd1hUxERIswxwdNYRLQ0uHEUixQS:7lCz3Uld5UxE7wxwvHEJ7
Malware Config
Extracted
octo
https://karateustalariningizemlisan.xyz/MTk5MTQ4ZGNkMDBi/
https://karateyolcususamuraidurusu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatefelsefesininizleri.xyz/MTk5MTQ4ZGNkMDBi/
https://dojovekaretekahramanlari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatesanatvesavasustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraivekarateduruslari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatedoguveteoribilgileri.xyz/MTk5MTQ4ZGNkMDBi/
https://karateantrenmanvesanat.xyz/MTk5MTQ4ZGNkMDBi/
https://karetecininkusursuzvurus.xyz/MTk5MTQ4ZGNkMDBi/
https://kareteharaketveteknik.xyz/MTk5MTQ4ZGNkMDBi/
https://savassanatlarinindunyasi.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalaringizemlibilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://dojoyolundagecenanilar.xyz/MTk5MTQ4ZGNkMDBi/
https://karatetarihvesanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalikursunumetodu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekahramankitalarustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraikavramvesanatifelsefe.xyz/MTk5MTQ4ZGNkMDBi/
https://karateevrenselustalikbilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekapsamlisanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://dojotarihiyolundandegisime.xyz/MTk5MTQ4ZGNkMDBi/
Extracted
octo
https://karateustalariningizemlisan.xyz/MTk5MTQ4ZGNkMDBi/
https://karateyolcususamuraidurusu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatefelsefesininizleri.xyz/MTk5MTQ4ZGNkMDBi/
https://dojovekaretekahramanlari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatesanatvesavasustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraivekarateduruslari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatedoguveteoribilgileri.xyz/MTk5MTQ4ZGNkMDBi/
https://karateantrenmanvesanat.xyz/MTk5MTQ4ZGNkMDBi/
https://karetecininkusursuzvurus.xyz/MTk5MTQ4ZGNkMDBi/
https://kareteharaketveteknik.xyz/MTk5MTQ4ZGNkMDBi/
https://savassanatlarinindunyasi.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalaringizemlibilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://dojoyolundagecenanilar.xyz/MTk5MTQ4ZGNkMDBi/
https://karatetarihvesanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalikursunumetodu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekahramankitalarustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraikavramvesanatifelsefe.xyz/MTk5MTQ4ZGNkMDBi/
https://karateevrenselustalikbilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekapsamlisanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://dojotarihiyolundandegisime.xyz/MTk5MTQ4ZGNkMDBi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4508-0.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.village.assume/app_page/WHUPc.json 4508 com.village.assume -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.village.assume Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.village.assume -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.village.assume -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.village.assume -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.village.assume android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.village.assume android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.village.assume android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.village.assume -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.village.assume -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.village.assume -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.village.assume -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.village.assume -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.village.assume
Processes
-
com.village.assume1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4508
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5833eee83870192bd25114e04579b22c5
SHA1f20c9ab0185d67ce4d209a985b8913afcd73ba08
SHA2565e418e3c3bf2f1ae64026dbe09f5e438fb43d021743bf5b9bd169f2b85fcd5f4
SHA512cd5c73171fc2f13effc8cb309fccd31fa753ee8721107651aee230c1d881800ab722cd7d7af663b90b4e676537ef81bad6bd9426eb9bd703285291fdaeefac78
-
Filesize
153KB
MD59fe01b42bcb34404972d9268e56f9772
SHA147a3648fb3b2d73f31e2789e4aa53d69a242948a
SHA256d85d8715213553dbc00836e068c494e70b8d8814e8454f37e83dbc9dc6a67356
SHA512fb4b615d6b5431554ce5ce69746a4a68db181a8d48605f7b08a6d168e1d042c290e28849026cd43e491e2e3e5e3446b73b391c6088a460998544e80b51aec646
-
Filesize
451KB
MD5e4038e7d11815c5684bf17f0f27c2972
SHA152a35c2548e310404197366f26990225c832bcbc
SHA256021735b168d0cb51a311d2c6d0ec4470bed5be6264e8fe161d08c3b4a09d1eef
SHA512f88ddcc73d7d34855381ca91df8c41fcd609ffce192654c5a25468c407a5a591f1bd2ecf39811caccbc2778f7c400bbab2ee3efb8e18cdc83c7f509c3600af7b