Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
15-01-2025 22:00
Static task
static1
Behavioral task
behavioral1
Sample
b656c0ecd8dd9699627bf135b1b8d435f712fab6aaf5a025a3a073e37aae7f52.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b656c0ecd8dd9699627bf135b1b8d435f712fab6aaf5a025a3a073e37aae7f52.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
b656c0ecd8dd9699627bf135b1b8d435f712fab6aaf5a025a3a073e37aae7f52.apk
-
Size
1.7MB
-
MD5
3cef236df99024f2cf29acb13782e8fb
-
SHA1
f42a779a77abc08ac920ee7f2e726aa9ad4cdbe8
-
SHA256
b656c0ecd8dd9699627bf135b1b8d435f712fab6aaf5a025a3a073e37aae7f52
-
SHA512
cb7ccdb893ecb203b7bb7c154dc72ef89cc06dba4ba8ea1d46c7f0726aee3364a151a1f0afc1644e753178f205626135eebee1046a59bd092ac96587533f6a3c
-
SSDEEP
49152:0W5P9r5/jdGenyDXed7jFrCMIBNtXGMKayZg41:RP9rD3nyzedPFFUtWMpyZx
Malware Config
Extracted
octo
https://hastanebilgimrehber.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimiletisim.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimkapsami.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimtavsiyesi.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimkaynak.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimyolu.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimgucu.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimguncel.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimyonetim.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimdestek.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimyenilik.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimkaynaklari.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimplatform.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimdogru.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimdogruluk.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimanlayis.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimhizmet.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimkalite.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimiletim.xyz/MzhiMTg0NTAwOTY5/
Extracted
octo
https://hastanebilgimrehber.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimiletisim.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimkapsami.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimtavsiyesi.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimkaynak.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimyolu.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimgucu.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimguncel.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimyonetim.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimdestek.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimyenilik.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimkaynaklari.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimplatform.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimdogru.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimdogruluk.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimanlayis.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimhizmet.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimkalite.xyz/MzhiMTg0NTAwOTY5/
https://hastanebilgimiletim.xyz/MzhiMTg0NTAwOTY5/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 2 IoCs
resource yara_rule behavioral1/memory/4241-0.dex family_octo behavioral1/memory/4214-0.dex family_octo -
pid Process 4214 co.learnol.bksfz -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/co.learnol.bksfz/app_attract/QQjShWe.json 4241 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/co.learnol.bksfz/app_attract/QQjShWe.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/co.learnol.bksfz/app_attract/oat/x86/QQjShWe.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/co.learnol.bksfz/app_attract/QQjShWe.json 4214 co.learnol.bksfz -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId co.learnol.bksfz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId co.learnol.bksfz -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock co.learnol.bksfz -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground co.learnol.bksfz -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.learnol.bksfz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.learnol.bksfz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.learnol.bksfz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.learnol.bksfz -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone co.learnol.bksfz -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS co.learnol.bksfz -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS co.learnol.bksfz -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS co.learnol.bksfz -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver co.learnol.bksfz -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal co.learnol.bksfz
Processes
-
co.learnol.bksfz1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4214 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/co.learnol.bksfz/app_attract/QQjShWe.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/co.learnol.bksfz/app_attract/oat/x86/QQjShWe.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4241
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD56dfe3c4fdc44a840623608aee1534825
SHA12fb5ef88d1d3fb5e5d23f894da178ecbb43395a5
SHA256a60048b39bb782fbfb06d3c0d1698087403a028a96bd6c00688fd22a8467b0b2
SHA5120d80c0d937079732b79f782b42ae8256bfbd5600a4a8b64a7b03833e8cdf73a9af33a0c629cc6433c14130970a86e80da2a8bb0e76f14aa8c32142a7078c5f55
-
Filesize
153KB
MD5799510934b0528d5117682f0e176363a
SHA157dd0fc1bbb9ebc2a35df4ca64d432f2ab1e9d31
SHA256ebac5776881ebdd501b8fa81340c28f028ad1b8474d3ee70b435d4903cee49e1
SHA5121c4474a3cb73c78ed35207b5d47c38244946323e86001ac2393b7e839317dc256c5e8aeb623a52e7f3cfade17adf1fb1630aadd7fc01dc81171e476c71b3746c
-
Filesize
450KB
MD5666a637d229504552caf5254d5fd101f
SHA1c1cc80f456ec181e0a7585c7968b33fabdda8027
SHA25684836dc78f117ad778b49008bd639dddf78d6366eefd48639c76e9977498ecbf
SHA5127a006641dac5b4cde6dbbb4426a87aaff77d64c9471cc5484e6060c1dbb1e17c967f26089b1a2d24dcd00d3c2e8b9c1423b6448138061b07f87e8bd49cb3664b
-
Filesize
450KB
MD5a26559217d84c32c2c8a0bb59f1ce1d8
SHA1f0ea68ad2bd177d8a4216b21db87500f5e0d25ee
SHA2562e51decdc36ac38ab36758a65dc87817eb319eff59b95f9c36abef0805671224
SHA512cea40a37df07feba39b6b106c9a9741b4b026da56af50b63352c440c4388c4be83c5477eab690a8c33735201ed3e1f2eac344b3262036c2a4f948154132f759a