Analysis
-
max time kernel
18s -
max time network
31s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
11-01-2025 16:38
Static task
static1
Behavioral task
behavioral1
Sample
126b1be114480fbfde8a32629cc751aaa9193bc42f0a4e51a0061ecf4c9f545f.apk
Resource
android-x86-arm-20240910-en
General
-
Target
126b1be114480fbfde8a32629cc751aaa9193bc42f0a4e51a0061ecf4c9f545f.apk
-
Size
8.5MB
-
MD5
ce38194daf07b959decc58bd6f815778
-
SHA1
ed8d1e00b1f0284701832ecca07a8c6443f89b33
-
SHA256
126b1be114480fbfde8a32629cc751aaa9193bc42f0a4e51a0061ecf4c9f545f
-
SHA512
386eca10c2be1b3e56f17a09992783fc9408111764e282ea94bb81cd1f91cb965771646c524f3d8e9173410f5cbab7efdd1b743c867defd1fca43755ddca5b29
-
SSDEEP
98304:ZPesozCrpdVPxRsaD26N3j7F+8j+FAsU43FWU7VK345iSRG59:ZP91xRP66Vj7ED4U7UIrY
Malware Config
Extracted
octo
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/memory/4303-1.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.eagent_setting3/app_nasty/wR.json 4329 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.eagent_setting3/app_nasty/wR.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.eagent_setting3/app_nasty/oat/x86/wR.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.eagent_setting3/app_nasty/wR.json 4303 com.eagent_setting3 Anonymous-DexFile@0xce478000-0xce4fb6e4 4303 com.eagent_setting3 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.eagent_setting3 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.eagent_setting3 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.eagent_setting3 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.eagent_setting3 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.eagent_setting3 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.eagent_setting3 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.eagent_setting3 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.eagent_setting3 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.eagent_setting3 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.eagent_setting3
Processes
-
com.eagent_setting31⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4303 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.eagent_setting3/app_nasty/wR.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.eagent_setting3/app_nasty/oat/x86/wR.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4329
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
1004B
MD5c63fa7b17210a06f9575539ac59975a2
SHA172248e552f11dc2d32768f4af40bf7855ccbfe42
SHA256595e783bab4ec713dc8048cfc056da6ce26d84914716016dbb927a7f7b0c4efd
SHA5123a020521507cd7ef7b3e980436280e0c8b596b5ae3d86d6133fd0d2b473334be03129b0cd4069d3aa1ede7e52a8dfbe3450f73257be3ba0f331f0862ee4dbf0a
-
Filesize
1004B
MD50def47e16f66182563ca961443b969d0
SHA10a82f7e03602f71c31781ba62dce65de33aadc45
SHA25651caa4ea229b15490309fe1501dc38dcf61270e9a8902366389ad9e028316903
SHA51227b920ca36a30619c374f3a72aed2904632e0c26b377dd90d9fa6640838f434f1569288b9a69b2294e32aca57155d4477fdf5f37748a20cdc5f44cbb797f2e04
-
Filesize
307KB
MD54e73947cabb5db3f92ca85004981b754
SHA16d9667fdb0280ed2dcb782b4683e422a51bdc601
SHA2566db94232e756b90ed437f1bc87dc38cf20fb2e7c7a19a5e40c6c17254b7e234c
SHA512be8b500a7070af1dfb53b0cf1a7b327dadc4e163a6dad905496ac228c58cd1ed87b054533917924455d35e9b300683ae33e1bcdd91935a5dbae1d693c3e13d69
-
Filesize
1KB
MD5551bc9820b6eb12f9dcdfe9edee3a672
SHA1af922a5bbf3aa407ddac14b0d3ea7f08a8ed20e6
SHA256fd67868a7ef527e9973b544fd21a009c137bf250909e0e1a48849fa275cf1dbc
SHA512380af12011db5e7dc874f813672726d9e98bcf88e702ce1f953bdd982c03276b2babd4fb0cfe94d3e0240bbb5dcc47c0496ded2788856dea620d580c2be7889a
-
Filesize
1KB
MD50b4e61ced2bbb87b9992c2bf844e249f
SHA1b5ccfe49aebca5c79437a74da7ffe069b4c7c639
SHA2565360005db059b71f282c0c7e940882283d9b9ff6e99dabadacd9813c1dea5fcc
SHA5120b260c679f94199cf127908f0e333545c3c4b48a1d96c8e4de462d31da2eee9d72b8fa44e2e81407ad7cb4257be66cc9ee2cc510389358c87fcac6f1a562c4f1
-
Filesize
525KB
MD55399134948fa6cbd1ceb77a8171f026a
SHA1f8dc8516f2888e41128408ba3fee806606ce8a9e
SHA256c9f79fa1cb5384ff92537839a2ac63c284ba985d71c8dd0e093570bfb1b8d223
SHA512a0d44a2772897cce6952b9025d529dc02cbf8c32d944ca7b1cf714ca82090eb401fc1838796f122d69d46b54505e079c0e30e04a5adb3b58a6b1a254f463a42f