Analysis

  • max time kernel
    29s
  • max time network
    36s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    10-01-2025 22:17

General

  • Target

    43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1.apk

  • Size

    5.3MB

  • MD5

    65e137500ec5072abe6e964e8007f364

  • SHA1

    89e491ea70e30eb7471e63ec32d05ae083aa0feb

  • SHA256

    43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1

  • SHA512

    c1977b3fab09595a2a7bc14f4da8a51a350ae0947f551557109d6b9126e388d4d999227fc917a8f1ea33cc712a9c9e3ccbd3a5b81dd0be252a65b1741cbc750b

  • SSDEEP

    98304:XW3QaAc8U6UyhFKwNPsQS0dlKeBAg6tcSFvCsPC4jur/z10fXgpXIU+X/ayCgL:G3EhJvyQSCKMAJmSFvzOGUoCgL

Malware Config

Extracted

Family

octo

C2

https://equisdeperson.space/MDI0ODlhNzAxYzg2/

https://rigorichbroker.com/MDI0ODlhNzAxYzg2/

https://personification.top/MDI0ODlhNzAxYzg2/

rc4.plain

Extracted

Family

octo

C2

https://equisdeperson.space/MDI0ODlhNzAxYzg2/

https://rigorichbroker.com/MDI0ODlhNzAxYzg2/

https://personification.top/MDI0ODlhNzAxYzg2/

AES_key
AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 5 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.differselffu
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4318
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.differselffu/app_ded/oat/x86/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4345
    • rm -r/data/user/0/com.differselffu/app_ded/oat/x86/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.odex
      2⤵
        PID:4372
      • rm -r/data/user/0/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex
        2⤵
          PID:4404
        • rm -r/data/user/0/com.differselffu/app_ded/oat/x86/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.vdex
          2⤵
            PID:4386

        Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex

          Filesize

          2.3MB

          MD5

          fbc1de001d68a8fe6b042e7c82f3eed6

          SHA1

          45615f326b5938e0a1080744bc831148ead45667

          SHA256

          90c7db3eb4edb58f1340a821c258343eb205e2d52325b5e46a2316f9035149a8

          SHA512

          973871d71feefa1438fbe9211c87dc93bb1203fad4a47adca2f44446f16fec45d6cf88ee0c3659facbc36c43b6af68e5eb272fa1ac8f9922e2dbb4ba1a226042

        • /data/data/com.differselffu/cache/wfgxmmh

          Filesize

          156KB

          MD5

          d5d39dcdfb58861595cf858a01b16675

          SHA1

          0d5b1d30e512a4cdb9f8c6b55777a19ac7e264c0

          SHA256

          74e16d5a4d4a5315d9ee7784e8655fed10df836303d423ca34e57382409b63df

          SHA512

          93717ba3a0a5b19b56217db95e53159fbfcb54e976dada09b3edee89cbae0eb75e6883fd63a2f4169fe6598ccfc57aca3226b73ebcab22ecafb3f06d8b4341af

        • /data/user/0/com.differselffu/app_ded/7gNRwZJhfLvLNQAIsRObt2GvlrH4EC58.dex

          Filesize

          2.3MB

          MD5

          67eb98ffdeeb07da8b95b16f3ebadf7f

          SHA1

          a653268e5590bae4c51de5ba21dab0dd090b41fa

          SHA256

          dba6fbb8661d3814978c11b93830f143d87cd23a7b1a9a47ea0ff08619604fcb

          SHA512

          305db36169597b0f94ed7fea1212450d617eeeaa9d84f4967e2c4602e623df2535c025818709f63b3adac54e91a3d1fd421e03d299d7e9622ad17a862a7bf841