Analysis
-
max time kernel
138s -
max time network
132s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
09-01-2025 17:32
Static task
static1
Behavioral task
behavioral1
Sample
b1ca09c0f2cb00b5046e1ec463724a58405df24d53a3d305703a44fe11664d54.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b1ca09c0f2cb00b5046e1ec463724a58405df24d53a3d305703a44fe11664d54.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
b1ca09c0f2cb00b5046e1ec463724a58405df24d53a3d305703a44fe11664d54.apk
-
Size
9.1MB
-
MD5
6a4dff4551c9dacf7516d7cc3f40e704
-
SHA1
235bf820fc529876bc1b8a70cf2ca33c747a97e8
-
SHA256
b1ca09c0f2cb00b5046e1ec463724a58405df24d53a3d305703a44fe11664d54
-
SHA512
0312299bfa220564cbdd5471f73a242d60664ea3afee4efefc7fb0fc333c07500c92a5b9ebdfa6c7443bfcb1aa06a4580d122d422a1f3a033ec8c69932a04ee4
-
SSDEEP
98304:IlE2T5iSRGyNVKWbF5g5nbHs406FEeNs3XKRsHiOfG9aRjW:varNUMF5g5bMDoi3XKRDv9aRS
Malware Config
Extracted
octo
https://63fbf2f62b78cc08552fcd87838b8e53.biz
https://8caf6a13209282f9dadc9eac58c5007e.com
https://c741e321a625f9195ee4b22f53b8f386.info
https://3e78d460183b1821b74529fb2cba4fe8.shop
https://f3ad8ca1cecfb4942d9b6cec53bbfe94.org
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4332-1.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sve_machinem57/app_surround/qwL.json 4332 com.sve_machinem57 /data/user/0/com.sve_machinem57/[email protected] 4332 com.sve_machinem57 -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sve_machinem57 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.sve_machinem57 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sve_machinem57 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sve_machinem57 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sve_machinem57 -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.sve_machinem57 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sve_machinem57 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.sve_machinem57 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.sve_machinem57
Processes
-
com.sve_machinem571⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4332
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
1010B
MD5e3afafdc67e5a63cb6d24d570807bb18
SHA1039479dade4c497c49fccfa0c4b61611e9a1998b
SHA25669076e0b6f17c0539e073be827f000e78314fd0cb605774576b727c3c678f5fc
SHA5122f8eb4ce6f528d53bcdb45ab3941c7c7606256451be78c5c2bbc8930136d3f4156054814ad1c0f0255389ebff24fd2b0c767fb821356cae2efc188e5b20593f6
-
Filesize
1010B
MD52a05be9dcac94d5f87e1a6cc43ba371d
SHA125072b2944f3c90c5d390ee77b4058069699412b
SHA25610712238c079b174e079200d020225409186216be95745d9f75dda8451a45fb7
SHA512ab03da8b8606cb510765bad019ea46376325ff58ecf6e297a23ea50b4c2b0e815ec8a5b9c2207780296b809b68bff59a93acb76a6de67f513810d87b941eaf62
-
Filesize
322KB
MD577dc50489b9323274732d27dc8a4e803
SHA10e02a3595b62489d0739d771881da8604d117c65
SHA256c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820
SHA5120684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58
-
/data/data/com.sve_machinem57/oat/x86_64/[email protected]
Filesize13KB
MD5965e2ee4809689ce1c372660c5805160
SHA1653a5a4e1a5ef50b31a14f82a6adb07b75900395
SHA2564e0b15703c04bdd83b340f492a8eb513cb7101b505153c8bbcd5b49b26f6e207
SHA512d167ea8e933e64131921cdfe7ce1666409d4478505ccc52f7ea81fc5a4b96f2c5eddb2fc2ae6b6d411020ef4502631e313aa7c6bbc0058c07ec84c6270e60ca4
-
/data/user/0/com.sve_machinem57/[email protected]
Filesize525KB
MD5a839358e493f15ef38d898b73ac9df5b
SHA1a64295aa160691ba58899141eee7f7e1014d234e
SHA256e4ace3a7c78897ab43dc8e69fab2e5b7e019e019041ef14155bc8d73225210a6
SHA5129e4d79b2ad9d1bcd462ebf41cbaaf6001a18808ecf5d6bebfddb4b493ae7afd26b7b218506103afe7ca9dd4f247ad5971444cd8cb4368f1f663c8927fc906ade
-
Filesize
1KB
MD5faa4dc8452ea032a3654286f5df9e8d3
SHA1342a4f63ee6b6ab92449cd795207eece1438bd9d
SHA2566fe345a4a133d5e58e8bd18b5ffdeb67ebb73484bf0fb65ced5ec121b7c4bb24
SHA51204007421f53efc35fd011269e82e57c9a410acc5d1f9b47399fc884cc28db409bafec1ebd99973a6aa7f95d2c372794fa91894cf35beecc7f853640244e6cc9a