Analysis
-
max time kernel
138s -
max time network
140s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
20-01-2025 13:27
Static task
static1
Behavioral task
behavioral1
Sample
file.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
file.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
file.apk
-
Size
7.8MB
-
MD5
d76876cd4f845e5c9e918106031e2e45
-
SHA1
91cf8d27a740afcc6ee76eef1fc2bf55229d496f
-
SHA256
2a2d23597c07df2304c553fa45723c0b53413b017b5116a70d6902ebc8266b91
-
SHA512
e6108596d871a30db74cb8a06cb62a5cabd476b353a1b3e1eb0078baeb309a3423af8d89e8c4797ef1d3c6d4f2b71c9cc7ebaeb5fbddbec8e431a6eac7e01881
-
SSDEEP
49152:Lesqd0n8YK64j7XRRsEX9fxM45iS7xrGlrGOWRGaVjVKScbRgMoaK7m7NuA6fQtH:D35T4j7BRsmxF5iSRGEtVKsADfVvvRT
Malware Config
Extracted
octo
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4476-1.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.teadapters_path45/app_garlic/BBNaAep.json 4476 com.teadapters_path45 /data/user/0/com.teadapters_path45/[email protected] 4476 com.teadapters_path45 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.teadapters_path45 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.teadapters_path45 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.teadapters_path45 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.teadapters_path45 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.teadapters_path45 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.teadapters_path45 -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.teadapters_path45 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.teadapters_path45 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.teadapters_path45 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.teadapters_path45
Processes
-
com.teadapters_path451⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4476
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
1009B
MD50cc6c267237c06bc1612b50a60049a4c
SHA1d66af1f79aedb70da413e2dbbb7aacfdf9d3cca9
SHA2565ab3e54647a51e39d48f02ca8bf56241215892de51b89f49710ac4ef088bff85
SHA512491d37902d9a6ec4d452694079281b81a8487a94a39035098f99900711fe5454069ac0194cdb9d1bfcb302fa857654a060a033ea2b79932c1ebcded006dc8616
-
Filesize
1009B
MD5f07eb67870cfe304f03a14512c625704
SHA1a760b58fbf71b004cc0e06b0fb70a8a3c2bc0f7a
SHA256b1895b068aa91861ff91a5ff921acf4122e38103333860016da942ee2cb628c6
SHA512cd95470e18bfe341455a1a4d9856176472fae60df0cf61647bd1b1f5ab56bd4dc814e9fc92963edc3ddd47df56ef4505c3e49fbe402868c0d9ca76729884ee56
-
Filesize
322KB
MD577dc50489b9323274732d27dc8a4e803
SHA10e02a3595b62489d0739d771881da8604d117c65
SHA256c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820
SHA5120684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58
-
/data/data/com.teadapters_path45/oat/x86_64/[email protected]
Filesize482B
MD53b10bfc77a410b78db57961704ed5591
SHA1a0e7d507b69454d4b1de81202973885391ee443d
SHA2567936000b6bff5d63b18c663752ab5f92a692bfedb06b845a9276fba4e330afcf
SHA5124456ef41ee7aee432e677eef3d8a8a19db40d69921d6919bc09d4164ccb697a84727e28d45411aeb79cb531c50089c4fe3ae2c518998f76fd13fc510d58a7c8e
-
/data/user/0/com.teadapters_path45/[email protected]
Filesize525KB
MD56dcf7ae4b969f0614d220458b9fa3b7c
SHA101cb66a7da6b7f5a51ef77c8daa59870516c89e4
SHA25615183d5e809cd3376b6494ba30428e6f9b6a65c6ea87fcc031bfd295d8e15a54
SHA51274d961a43d309dc6addfdc1b26446beefea9e90b77741811aa8ccf7b39e0c104a947bf54ae58da27e2f2f833c33514732c0936f07d46b7d2118aaa26733cbf43
-
Filesize
1KB
MD51b6b23a83d5bb26ec1bf26b85fed2055
SHA1c60b832dcec3353cfa55b99b6cfa78f0edb1eb24
SHA256c6a2053aadc92dc58191754113c90aff39af2b6f7c83892326ce3430257ba19b
SHA512fb6ea451f8c0d8cb042fd1648c0833775c37a419c257e8d74d96025576e05f1e47445a3c578d848a16db3f3abf6c38e38480f72468ff31d3418c6c6483ac244b