Analysis
-
max time kernel
22s -
max time network
36s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
09-01-2025 17:27
Static task
static1
Behavioral task
behavioral1
Sample
bad9af2eace801253d4e9f5ad61522766ab7e9e33721f95f51e45a232319a855.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bad9af2eace801253d4e9f5ad61522766ab7e9e33721f95f51e45a232319a855.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
bad9af2eace801253d4e9f5ad61522766ab7e9e33721f95f51e45a232319a855.apk
-
Size
8.5MB
-
MD5
1fe48704d358f39e8a1e6793cf32ec44
-
SHA1
6ed078ae15c6ab2137c0c13220034178c03cb572
-
SHA256
bad9af2eace801253d4e9f5ad61522766ab7e9e33721f95f51e45a232319a855
-
SHA512
745f68d63ba7ce71bbb510d86a7bfff5247a137f1da50919a4478c951cd4315bc9b8c9500326d2504bf07a1d0b3f3dcbd9bad550f8daacff694051069b8dc052
-
SSDEEP
98304:kUHvo3XaRsP6766ce3VlFRKxP5t5iSRG7lVK0/mlAJ:fHg3XaR9OOlFRktrwU8Z
Malware Config
Extracted
octo
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4313-1.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.hdialog_servicess/app_mammal/FKpH.json 4313 com.hdialog_servicess /data/user/0/com.hdialog_servicess/[email protected] 4313 com.hdialog_servicess -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.hdialog_servicess -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.hdialog_servicess -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.hdialog_servicess -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.hdialog_servicess -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.hdialog_servicess -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.hdialog_servicess -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.hdialog_servicess -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.hdialog_servicess -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.hdialog_servicess
Processes
-
com.hdialog_servicess1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4313
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
1010B
MD5d45f285d760aacaea8b62b929aa7f508
SHA16f471650304c1d35ab48a4e550783e4ccb9da789
SHA256d39366b198e424fddba0ee8ce70cb2bca7b19ed5a3c34766c7d5bba3e2b29c8b
SHA5124dce6bad49244776f28e864391a181b32469ea015f78c95457a629e594c036578085ef091f12a73427b14b058c9130299d2a5bece3d58d5bc059f6742c0c833b
-
Filesize
1010B
MD5eab23d1419c87d9808562b2771551ebf
SHA1173d4cacd41dae266af18d572f4c9129b0cae5b3
SHA2562a4dbea84f737c6a3c0c39f19b3bb8cc435a20fa9023d57fa5459bfc19e2fcc8
SHA512981f16ff820579e2c26cb9bbf98b849f8bee19a10d92c1c544fc90b28da2b746114df05b4bb9392d5a262eb825915df6674da217155f6ecb38ce978acb79f421
-
Filesize
322KB
MD577dc50489b9323274732d27dc8a4e803
SHA10e02a3595b62489d0739d771881da8604d117c65
SHA256c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820
SHA5120684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58
-
/data/data/com.hdialog_servicess/oat/x86_64/[email protected]
Filesize13KB
MD54eb213f0d42284cc4cf322fc0dacf94f
SHA18b85fb993b16b30b85b222ed892493824fe987f8
SHA25619f2425bd95673b36d29ead708031c0d65526700d542c609e5bcba2d7fd0343c
SHA5123d20473a2b49c5fb31f24b111477398af5934b402c36282f949f982764775b4366654c6595386dfb9792d53c8e28d09281da7d7515761868b4b2c52ef4f5ca18
-
/data/user/0/com.hdialog_servicess/[email protected]
Filesize525KB
MD570981d9418d72fd36fb9ccb8e7f748ab
SHA151f11625438841aa3237fdd802e52dfb0a319ee0
SHA25628d7d08a0784db4a93c374ee56d0b65206811095d8d615920ec86c2f891e571f
SHA512102b421a97848174c2966fbda529c000c83dfb084932bfbf824d1bd8424aa1c4fb7ae703c594dcca54747bd6155c2281d4d9533f63a5741ae951236651446c22
-
Filesize
1KB
MD519d7065bc89f19f238e3dea5a14c2656
SHA1184ad6076d7999fb479c1c04e2f7f21c04d3a408
SHA256ce9084a376132fbfa09e46889a4d8c86042c480f9c13d7696e9f16c64a97dc74
SHA5126660ae94d90a7ec9e9fca897f16ced96a019acaccc413a47e84a71e36742cee22e87445a04627267493c49830e89fcbdc88bf91b6e020e000f4fde10088f663d