Analysis
-
max time kernel
149s -
max time network
157s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
16/01/2025, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
893c7acf0845068751e0b00083e07a21d92c41e43222ce3fb66d4be3781d2f9c.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
893c7acf0845068751e0b00083e07a21d92c41e43222ce3fb66d4be3781d2f9c.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
893c7acf0845068751e0b00083e07a21d92c41e43222ce3fb66d4be3781d2f9c.apk
-
Size
1.2MB
-
MD5
a419d41c065e6842563a5c85d626edba
-
SHA1
886357c63ce6f7981e3a37d825221436fb94de10
-
SHA256
893c7acf0845068751e0b00083e07a21d92c41e43222ce3fb66d4be3781d2f9c
-
SHA512
70b5871bb3d8f4e839e5e7aa26b78b46652f30a0ec1539f20b02f3e9d2b09441259e92082f251085aab22d4eda0e12ebab86b8147bca454af3e045c4f827ddfa
-
SSDEEP
24576:eA9lRTz79blXKYDYlxjC0qQ3kK3PZsW5NguTI:ey1LKMOikkKwuTI
Malware Config
Extracted
octo
https://ruceayipma.xyz/YjVmNGU0NmNhODlm/
https://yapayzekaisyanlari.xyz/YjVmNGU0NmNhODlm/
https://makineordulariyukseliyor.xyz/YjVmNGU0NmNhODlm/
https://teknolojinisyanhikayesi.xyz/YjVmNGU0NmNhODlm/
https://robotkorsanlargeliyor.xyz/YjVmNGU0NmNhODlm/
https://dunyayirobotlarkapliyor.xyz/YjVmNGU0NmNhODlm/
https://mekanikordularinintikam.xyz/YjVmNGU0NmNhODlm/
https://otomasyonkalesindemucadele.xyz/YjVmNGU0NmNhODlm/
https://robotlarvemakineisyanlari.xyz/YjVmNGU0NmNhODlm/
https://teknolojikseferberlik.xyz/YjVmNGU0NmNhODlm/
https://yapayordularinhikayesi.xyz/YjVmNGU0NmNhODlm/
https://makinevekodisyancilari.xyz/YjVmNGU0NmNhODlm/
https://mekanikorduyolculugu.xyz/YjVmNGU0NmNhODlm/
https://robotikturunculer.xyz/YjVmNGU0NmNhODlm/
https://mekanikisyanveteknoloji.xyz/YjVmNGU0NmNhODlm/
https://makineuyanikaynaklari.xyz/YjVmNGU0NmNhODlm/
https://mekanikseferisyani.xyz/YjVmNGU0NmNhODlm/
https://yapayzekauyanislari.xyz/YjVmNGU0NmNhODlm/
https://robotinsanvedunyavasfi.xyz/YjVmNGU0NmNhODlm/
https://dunyayisaranmekanik.xyz/YjVmNGU0NmNhODlm/
Extracted
octo
https://ruceayipma.xyz/YjVmNGU0NmNhODlm/
https://yapayzekaisyanlari.xyz/YjVmNGU0NmNhODlm/
https://makineordulariyukseliyor.xyz/YjVmNGU0NmNhODlm/
https://teknolojinisyanhikayesi.xyz/YjVmNGU0NmNhODlm/
https://robotkorsanlargeliyor.xyz/YjVmNGU0NmNhODlm/
https://dunyayirobotlarkapliyor.xyz/YjVmNGU0NmNhODlm/
https://mekanikordularinintikam.xyz/YjVmNGU0NmNhODlm/
https://otomasyonkalesindemucadele.xyz/YjVmNGU0NmNhODlm/
https://robotlarvemakineisyanlari.xyz/YjVmNGU0NmNhODlm/
https://teknolojikseferberlik.xyz/YjVmNGU0NmNhODlm/
https://yapayordularinhikayesi.xyz/YjVmNGU0NmNhODlm/
https://makinevekodisyancilari.xyz/YjVmNGU0NmNhODlm/
https://mekanikorduyolculugu.xyz/YjVmNGU0NmNhODlm/
https://robotikturunculer.xyz/YjVmNGU0NmNhODlm/
https://mekanikisyanveteknoloji.xyz/YjVmNGU0NmNhODlm/
https://makineuyanikaynaklari.xyz/YjVmNGU0NmNhODlm/
https://mekanikseferisyani.xyz/YjVmNGU0NmNhODlm/
https://yapayzekauyanislari.xyz/YjVmNGU0NmNhODlm/
https://robotinsanvedunyavasfi.xyz/YjVmNGU0NmNhODlm/
https://dunyayisaranmekanik.xyz/YjVmNGU0NmNhODlm/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4779-0.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.message.school/app_arm/fpjx.json 4779 com.message.school -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.message.school Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.message.school -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.message.school -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.message.school -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.message.school android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.message.school android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.message.school android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.message.school -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.message.school -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.message.school -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.message.school -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.message.school -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.message.school
Processes
-
com.message.school1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4779
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD53b876d9e5e8d52d4432fd26ad3f87c57
SHA1e41bcac8be3260723a4ceeb99c04c54e512a45b8
SHA256341acb4f279da9b42fe6083b683ce566f65711e744838627ab74df33c2e262fd
SHA512ef8d448ec197c1371dc2cc07dca4229fab548e5f3ea6475964d9e977fcdfda40a8da6e7cf5e445cb6326a6db8dc958125f1055ebc8e430d48afea7e2a7ef21e3
-
Filesize
153KB
MD59a95bf6c2d7fa79daf1eb15641a02fc7
SHA139b685682fa987a295e2ef6c0e64c8b86f4613f1
SHA256ed94f48618a561dc736029767c7c51efd1e602957cfbfaa13e1718137a563675
SHA512bdf3b1e0f1d0aa80c2c9140c96b2aa9c99073bc9f2ad2db0b93f752d88882e265820ebe99b1b0dcb2a5fa86c2858a7ecbcd2d2e3fd88b4101dd7288f52e3c64f
-
Filesize
450KB
MD563ac72136d466a3545ccd894a887af35
SHA147bd30afb0209132f31e3b8845b0ed7ab6b9e21a
SHA2567852eefb16451e51012e02756540fcb3251e6caff1e022d6d01365e17f212359
SHA512b7faac07753881ce74ee23ceebe2d6aa2c1b3f07ddbdd81ab35daa805c3d2ddf9d9ff4234acda4247b412c3a6a61eec737770519380a6ef858d61d148761461f