Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    08/01/2025, 22:05

General

  • Target

    1961e45672a5f8efe13bdb61abf2801486091f4c1170ec90b251584efb1613d6.apk

  • Size

    541KB

  • MD5

    9b4b09ada0db69515a227bbbd97a8660

  • SHA1

    fdc36a054d701811ceb472144e6283ff44dc3712

  • SHA256

    1961e45672a5f8efe13bdb61abf2801486091f4c1170ec90b251584efb1613d6

  • SHA512

    b7a4707870602c61e50ba6e43276e04d4131ffcd7e5760ae3724f7302276fa15a6c8843d291bee6e9a04ffdc8e6d30da5f21e370e4a809c4ceac7fcd0289bbe2

  • SSDEEP

    12288:KBQgQ1Efoig1e/YDj/FvSB4tymAYrGkdwnbhY+3gBxhmn4gmU5p4ZnhbGp:vgVgXw/YDj/FvGur5InbhkBPQJp4ZnU

Malware Config

Extracted

Family

octo

C2

https://179.43.142.190/MDQ4Yzc4NTJkYTg4/

https://azisswravaas.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswravaas1.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswravaas2.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswravaas5.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswravaas34.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswrav44as2.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswrava333as2.xyz/MDQ4Yzc4NTJkYTg4/

rc4.plain

Extracted

Family

octo

C2

https://179.43.142.190/MDQ4Yzc4NTJkYTg4/

https://azisswravaas.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswravaas1.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswravaas2.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswravaas5.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswravaas34.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswrav44as2.xyz/MDQ4Yzc4NTJkYTg4/

https://azisswrava333as2.xyz/MDQ4Yzc4NTJkYTg4/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.blackgrow19
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4642

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.blackgrow19/cache/jxskoqajhblvka

    Filesize

    450KB

    MD5

    7167fa7cc6caa67319157c6bf3d1992e

    SHA1

    e8c54ddb386997c05731c429e2eddc886fca0dbf

    SHA256

    854845029d74db0dafe75b014a974b0a0c9955fb7ef86404d94279d6ed7b066d

    SHA512

    a5da43b9da9dd10e4301600eb31ca511b78cfaa091f3e698cb8bc553e61229ea733dffe90e7c5e210d76e40a3d732f278e1d4b330f6e144cb7d1f00abdea2532

  • /data/user/0/com.blackgrow19/cache/oat/jxskoqajhblvka.cur.prof

    Filesize

    313B

    MD5

    eb0739108b19d43f9b93a8a9c14da197

    SHA1

    e4f8a754cd06a7f2f4473125c91e4155ee931ed5

    SHA256

    f82944febc6409750881cc6960f0e596da05d182239794d238b8abe5cb971f82

    SHA512

    ff1aa42dd944b335b583df22f8f15c9c1e73ba20af13af1223a1115fb039ec463a789ea2c093b6f1093a48b496956c5776347c93db7601a624b697b8ca6f9d67