Analysis
-
max time kernel
149s -
max time network
155s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
14-01-2025 22:02
Static task
static1
Behavioral task
behavioral1
Sample
8c58aee3ae9f47c08c8788d0a76491ddc60231c07f6cb128f09ec4468ad24a27.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8c58aee3ae9f47c08c8788d0a76491ddc60231c07f6cb128f09ec4468ad24a27.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
8c58aee3ae9f47c08c8788d0a76491ddc60231c07f6cb128f09ec4468ad24a27.apk
-
Size
2.4MB
-
MD5
f81cfa12b529ab7c6b28f16fed8b015b
-
SHA1
1b11a3b5a54e06df0278c1f23b26997c5e5dcabf
-
SHA256
8c58aee3ae9f47c08c8788d0a76491ddc60231c07f6cb128f09ec4468ad24a27
-
SHA512
3628dd71bd410a93c69fcba330eb14c58a2aaf89cf897bc03d87dee5294723ae2ce64e533cc4bfd4fea745578fc35fa6f11d263513f716a8ef22389dbc64bb50
-
SSDEEP
49152:Ubq9YF0IbFwr8Lxl4GJwMzP8Zz/UB55tksQogQdsBnRRJSCrq:78RjxlLJwG8Tw5LQogIsBTJ3m
Malware Config
Extracted
octo
https://91.202.233.164/NzcxZWQ4MWEzZjRk/
https://694b64c9229d92124125w2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d921s23532adsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c99d921s3532sw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d9e2adsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c922153256dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d954362sw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229151312dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229135131dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d94663sw2.com/NzcxZWQ4MWEzZjRk/
Extracted
octo
https://91.202.233.164/NzcxZWQ4MWEzZjRk/
https://694b64c9229d92124125w2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d921s23532adsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c99d921s3532sw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d9e2adsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c922153256dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d954362sw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229151312dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229135131dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d94663sw2.com/NzcxZWQ4MWEzZjRk/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.severalfivexzye/cache/urqbt 4506 com.severalfivexzye -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.severalfivexzye Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.severalfivexzye -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.severalfivexzye -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.severalfivexzye -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.severalfivexzye android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.severalfivexzye android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.severalfivexzye android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.severalfivexzye android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.severalfivexzye android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.severalfivexzye -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.severalfivexzye -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.severalfivexzye -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.severalfivexzye -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.severalfivexzye -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.severalfivexzye
Processes
-
com.severalfivexzye1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4506
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405B
MD569346f52a712138dad2c357172e92c81
SHA1b167239362035d3c752bd7049b8abc39f4337c2a
SHA256383f41f09f8027664a02c311e9ef1145542d34df6f50c8dcf67a2d82b768496b
SHA512af416c5505740e36a0e5897ff647c008ec837fffd70637c895aee82a305beee7699f74047226b445390dbe2035728d39971863f2f92b0f1771a8193d8c12a8ae
-
Filesize
2.3MB
MD560cec6f42013e9feb54fc3f79017557c
SHA18a8c0d461218f0a3517da5dd63c9cee51497f3de
SHA256be0158450ac014ac8151a24a7b3cc338baa2ad48b59c1cfa0f0256d36d95f760
SHA5123c9b06d596f19d446997cdc558c463bfaef2b651a7ad230b53bb3bba03f9b281f713a3ed28f2bbeadeeab69ee0e673df664a4585a50952ee09ea5ac72a27e633