Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    14-01-2025 22:05

General

  • Target

    19588f7d204c8d08b417113f564419f25cdce2200478a43ceae97eaf43d8c80e.apk

  • Size

    2.4MB

  • MD5

    fc18108129c5bddfda403636208174fe

  • SHA1

    5d5b75e3b7d39625142932b3fe695b6331f47199

  • SHA256

    19588f7d204c8d08b417113f564419f25cdce2200478a43ceae97eaf43d8c80e

  • SHA512

    5300f482878d787c316233dec55178679b4af780a86d5e744fa291970422a45083b58e5469df10454fe2481c903470ac6625a98b8216372f4d8b1f1c0a450500

  • SSDEEP

    49152:s5ZPeyUabIeOgUYBHwi/wRoOERs982jdG4SyD8spDpOwJ:s/eDZgdBHO5Ms982PSyD8spXJ

Malware Config

Extracted

Family

octo

C2

https://91.202.233.164/NzcxZWQ4MWEzZjRk/

https://694b64c9229d92124125w2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d921s23532adsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c99d921s3532sw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d9e2adsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c922153256dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d954362sw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229151312dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229135131dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d94663sw2.com/NzcxZWQ4MWEzZjRk/

rc4.plain

Extracted

Family

octo

C2

https://91.202.233.164/NzcxZWQ4MWEzZjRk/

https://694b64c9229d92124125w2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d921s23532adsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c99d921s3532sw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d9e2adsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c922153256dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d954362sw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229151312dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229135131dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d94663sw2.com/NzcxZWQ4MWEzZjRk/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.vowelstart21
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4321

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.vowelstart21/cache/oat/tsbpcdpbnkifwfr.cur.prof

    Filesize

    528B

    MD5

    d1067df4c4248abdfc94cc9e62a20ceb

    SHA1

    a572364965c0722278241c8314fb3eac4b351ba2

    SHA256

    f1cd637a79cfef691c6b00a7952a26214187100c70032bfaf0db8a9d8ae1578d

    SHA512

    0fc53de92ca5246fc2add058c4ba68a3ba489a3340da7f6af3f99c925422fbf9ed83c10778a4c212f57e048f85c4611a1d39711e58cb70a21db2c99a37af1ec0

  • /data/data/com.vowelstart21/cache/tsbpcdpbnkifwfr

    Filesize

    2.3MB

    MD5

    92a0b427795b2672f524b8341fec6a42

    SHA1

    40ce3e90ea94dab25340cc98c82a6ad47b9e7dd4

    SHA256

    ef01bb6186a6cb286102731da5f55375013c28677780a77e858a8bb0c3686552

    SHA512

    f376b0bff51394f753e75d20aaf3ae39921fdc2fa0430b59a0931b52678f8270cf64a63655b6049732bbaefc50e1ed32881420c58759d0f7aa2e6f5a76150306