Analysis
-
max time kernel
29s -
max time network
36s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
10-01-2025 22:17
Static task
static1
Behavioral task
behavioral1
Sample
43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1.apk
Resource
android-x86-arm-20240624-en
General
-
Target
43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1.apk
-
Size
5.3MB
-
MD5
65e137500ec5072abe6e964e8007f364
-
SHA1
89e491ea70e30eb7471e63ec32d05ae083aa0feb
-
SHA256
43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1
-
SHA512
c1977b3fab09595a2a7bc14f4da8a51a350ae0947f551557109d6b9126e388d4d999227fc917a8f1ea33cc712a9c9e3ccbd3a5b81dd0be252a65b1741cbc750b
-
SSDEEP
98304:XW3QaAc8U6UyhFKwNPsQS0dlKeBAg6tcSFvCsPC4jur/z10fXgpXIU+X/ayCgL:G3EhJvyQSCKMAJmSFvzOGUoCgL
Malware Config
Extracted
octo
https://equisdeperson.space/MDI0ODlhNzAxYzg2/
https://rigorichbroker.com/MDI0ODlhNzAxYzg2/
https://personification.top/MDI0ODlhNzAxYzg2/
Extracted
octo
https://equisdeperson.space/MDI0ODlhNzAxYzg2/
https://rigorichbroker.com/MDI0ODlhNzAxYzg2/
https://personification.top/MDI0ODlhNzAxYzg2/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-5.dat family_octo -
pid Process 4318 com.differselffu -
Loads dropped Dex/Jar 1 TTPs 5 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex 4318 com.differselffu /data/user/0/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex 4345 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.differselffu/app_ded/oat/x86/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex 4318 com.differselffu /data/user/0/com.differselffu/cache/wfgxmmh 4318 com.differselffu /data/user/0/com.differselffu/cache/wfgxmmh 4318 com.differselffu -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.differselffu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.differselffu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.differselffu -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.differselffu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.differselffu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.differselffu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.differselffu -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.differselffu -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.differselffu -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.differselffu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.differselffu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.differselffu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.differselffu
Processes
-
com.differselffu1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4318 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.differselffu/app_ded/oat/x86/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4345
-
-
rm -r/data/user/0/com.differselffu/app_ded/oat/x86/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.odex2⤵PID:4372
-
-
rm -r/data/user/0/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex2⤵PID:4404
-
-
rm -r/data/user/0/com.differselffu/app_ded/oat/x86/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.vdex2⤵PID:4386
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5fbc1de001d68a8fe6b042e7c82f3eed6
SHA145615f326b5938e0a1080744bc831148ead45667
SHA25690c7db3eb4edb58f1340a821c258343eb205e2d52325b5e46a2316f9035149a8
SHA512973871d71feefa1438fbe9211c87dc93bb1203fad4a47adca2f44446f16fec45d6cf88ee0c3659facbc36c43b6af68e5eb272fa1ac8f9922e2dbb4ba1a226042
-
Filesize
156KB
MD5d5d39dcdfb58861595cf858a01b16675
SHA10d5b1d30e512a4cdb9f8c6b55777a19ac7e264c0
SHA25674e16d5a4d4a5315d9ee7784e8655fed10df836303d423ca34e57382409b63df
SHA51293717ba3a0a5b19b56217db95e53159fbfcb54e976dada09b3edee89cbae0eb75e6883fd63a2f4169fe6598ccfc57aca3226b73ebcab22ecafb3f06d8b4341af
-
Filesize
2.3MB
MD567eb98ffdeeb07da8b95b16f3ebadf7f
SHA1a653268e5590bae4c51de5ba21dab0dd090b41fa
SHA256dba6fbb8661d3814978c11b93830f143d87cd23a7b1a9a47ea0ff08619604fcb
SHA512305db36169597b0f94ed7fea1212450d617eeeaa9d84f4967e2c4602e623df2535c025818709f63b3adac54e91a3d1fd421e03d299d7e9622ad17a862a7bf841