Analysis
-
max time kernel
149s -
max time network
144s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
25-12-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
de3fa67bfa9272e457092f83e3dfd8c8a179a6f3f12216347de14088e051b8c3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
de3fa67bfa9272e457092f83e3dfd8c8a179a6f3f12216347de14088e051b8c3.apk
Resource
android-x64-20240910-en
General
-
Target
de3fa67bfa9272e457092f83e3dfd8c8a179a6f3f12216347de14088e051b8c3.apk
-
Size
2.3MB
-
MD5
9c28313ac351fa10ce97e5b80a91008c
-
SHA1
1fa4931260be88f330184a345668db05d583a868
-
SHA256
de3fa67bfa9272e457092f83e3dfd8c8a179a6f3f12216347de14088e051b8c3
-
SHA512
f389bf648e3e1e0721717f27500dfb5a3ba5ce3972bf8e60a5e0eb195022df0d8744597f6cbda746c89fd27fa8f1903abf64e0fc15a8f8277e4bee6d63ac9000
-
SSDEEP
49152:9Y60OBXrf5of9ukVh8ldHUbdXh6wOLajIaSm+gRIRZME3kgZB276bikRXO:9Y6nDqckXydIXMfLap0gIRZ5kvQikhO
Malware Config
Extracted
octo
https://karateustalariningizemlisan.xyz/MTk5MTQ4ZGNkMDBi/
https://karateyolcususamuraidurusu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatefelsefesininizleri.xyz/MTk5MTQ4ZGNkMDBi/
https://dojovekaretekahramanlari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatesanatvesavasustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraivekarateduruslari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatedoguveteoribilgileri.xyz/MTk5MTQ4ZGNkMDBi/
https://karateantrenmanvesanat.xyz/MTk5MTQ4ZGNkMDBi/
https://karetecininkusursuzvurus.xyz/MTk5MTQ4ZGNkMDBi/
https://kareteharaketveteknik.xyz/MTk5MTQ4ZGNkMDBi/
https://savassanatlarinindunyasi.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalaringizemlibilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://dojoyolundagecenanilar.xyz/MTk5MTQ4ZGNkMDBi/
https://karatetarihvesanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalikursunumetodu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekahramankitalarustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraikavramvesanatifelsefe.xyz/MTk5MTQ4ZGNkMDBi/
https://karateevrenselustalikbilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekapsamlisanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://dojotarihiyolundandegisime.xyz/MTk5MTQ4ZGNkMDBi/
Extracted
octo
https://karateustalariningizemlisan.xyz/MTk5MTQ4ZGNkMDBi/
https://karateyolcususamuraidurusu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatefelsefesininizleri.xyz/MTk5MTQ4ZGNkMDBi/
https://dojovekaretekahramanlari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatesanatvesavasustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraivekarateduruslari.xyz/MTk5MTQ4ZGNkMDBi/
https://karatedoguveteoribilgileri.xyz/MTk5MTQ4ZGNkMDBi/
https://karateantrenmanvesanat.xyz/MTk5MTQ4ZGNkMDBi/
https://karetecininkusursuzvurus.xyz/MTk5MTQ4ZGNkMDBi/
https://kareteharaketveteknik.xyz/MTk5MTQ4ZGNkMDBi/
https://savassanatlarinindunyasi.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalaringizemlibilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://dojoyolundagecenanilar.xyz/MTk5MTQ4ZGNkMDBi/
https://karatetarihvesanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://karateustalikursunumetodu.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekahramankitalarustasi.xyz/MTk5MTQ4ZGNkMDBi/
https://samuraikavramvesanatifelsefe.xyz/MTk5MTQ4ZGNkMDBi/
https://karateevrenselustalikbilgisi.xyz/MTk5MTQ4ZGNkMDBi/
https://karatekapsamlisanatustalari.xyz/MTk5MTQ4ZGNkMDBi/
https://dojotarihiyolundandegisime.xyz/MTk5MTQ4ZGNkMDBi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/5134-0.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.cannon.tuna/app_thrive/ZuLyAX.json 5134 com.cannon.tuna -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cannon.tuna Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cannon.tuna -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.cannon.tuna -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.cannon.tuna -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cannon.tuna android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cannon.tuna android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cannon.tuna android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cannon.tuna -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.cannon.tuna -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.cannon.tuna -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.cannon.tuna
Processes
-
com.cannon.tuna1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:5134
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD52860914d9664e92e73f02da70b937129
SHA1eab9e27d44662b804411e39967bd58f286246a66
SHA2568b4cafaf06d90185647118c385a2667b8d25efdad9d7528ea915b3ba25568a51
SHA512c33a82168721c9f4b9d3c7304cf38c20dc6533557f92a91bcc3c03e288227fb5354d8c1b632724a933d9df94cd33e273725259dfa6a31cf7e9730b10c3e58399
-
Filesize
153KB
MD5bed0c9ad9f4cf68dc96a66bdd091d4f1
SHA11cd7ca97c99eacbfed2bcec76f858904f9330df1
SHA256476452a55ec265813e3198ca9aa2cb508a9f77356927c64299adb78cfd3a1035
SHA5125075fe463cf4ae23f1f47006bd478a240d87a7f78fbf41ff1848ad289c771a7f6bae0a448407f322689f1cdbd3e950e74348fad8b5fb597d520c8877b0ad824d
-
Filesize
450KB
MD5c7326cf5b49c2e43b20e1dc66acff953
SHA13d645efe86b277c1110e187ec0801774537974d9
SHA25623334d1d32f2b23e82e8f6c937861961050b02539d31c23359333585cd49a2dd
SHA5125cc98028316cbd8ab22e5805c33068dbbcce9942aad53633b2a28f73ddc25566a4301a27c2b82465e46835ed5998464789a543d17b4939c4569315b49f9d0dd4