Analysis
-
max time kernel
139s -
max time network
160s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
21-01-2025 07:01
Static task
static1
Behavioral task
behavioral1
Sample
file.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
file.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
file.apk
-
Size
7.6MB
-
MD5
b7761d4018845e498ef5346fe7df5046
-
SHA1
8ee9f8d38a8346285ab4620ab62eb1682b2b51f7
-
SHA256
cfd13962829901068562d55a62007e59a04533ef37e683c18f668f4b9b631681
-
SHA512
2bfffb7148d72eb04410aea19ddb2d7c43822da1a7d25e6631c1b0a7fbdf10b0d5892bffa82630798da8625c1e9a2c4c1defe03f068ce10da86b81543506a399
-
SSDEEP
98304:01l5iSRGOiEOs1ZTH5G0RsaNSt8j70VKLxSiAvQdlyD:01lrHT5G0R7guj70U0iEQo
Malware Config
Extracted
octo
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/memory/4249-1.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xaapplication_notesi/app_invest/ys.json 4276 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xaapplication_notesi/app_invest/ys.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xaapplication_notesi/app_invest/oat/x86/ys.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.xaapplication_notesi/app_invest/ys.json 4249 com.xaapplication_notesi Anonymous-DexFile@0xd1d78000-0xd1dfb8b4 4249 com.xaapplication_notesi -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.xaapplication_notesi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.xaapplication_notesi -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.xaapplication_notesi -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.xaapplication_notesi -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.xaapplication_notesi -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.xaapplication_notesi -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.xaapplication_notesi -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.xaapplication_notesi -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.xaapplication_notesi
Processes
-
com.xaapplication_notesi1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4249 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xaapplication_notesi/app_invest/ys.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xaapplication_notesi/app_invest/oat/x86/ys.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4276
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
1014B
MD5085e66d584e5ca8217a4184de9c19a06
SHA13efd05de59acfef78494801c2ba40572953cc72f
SHA25694db9f1ee6370b276ec68468faee14cf92f0603bbe6ccede4afbdceb3bc0e4c8
SHA51276e60c74a03dc4246b3d3e074baceb92ae20b24306193cb510446696274981cf095d0c77b3b85af656ea8ce5ac98334b65784f29b2e7669f6eb80528769147b3
-
Filesize
1014B
MD5bebc6a4f7577054d43e698f91df61391
SHA16f3eb27b0940d14e2718f7eda4d35146ed006004
SHA2569f8efcb2281bb94015e8f5a733630c82dfed6585f07a1a4df1f15b19289094a6
SHA51283ba7c68f5abbab15f04fb95e9ea0b5439317496e3ce954c8d677a8f97f00d55eff9c6cbea6c44d10890f9706fc28ca75057d980691ac9daaa8be9b0e8aef388
-
Filesize
307KB
MD54e73947cabb5db3f92ca85004981b754
SHA16d9667fdb0280ed2dcb782b4683e422a51bdc601
SHA2566db94232e756b90ed437f1bc87dc38cf20fb2e7c7a19a5e40c6c17254b7e234c
SHA512be8b500a7070af1dfb53b0cf1a7b327dadc4e163a6dad905496ac228c58cd1ed87b054533917924455d35e9b300683ae33e1bcdd91935a5dbae1d693c3e13d69
-
Filesize
1KB
MD539cd40dc2d084043bf043759452c824a
SHA107ec1e3ea6c85685cee16726284d8b90820a2da2
SHA2560d834d3aff4207e9746c3e9d7e8bc6f2af6dcf5ae5ef40dc85918145ba55323a
SHA512cda6124d30ff70cefe5562614676e1f2bd557c9841667e0a1503afa7b95f0ff7c0da83ff8b996d1a06006417c40429f24babcc096d00684c1582ac007ba58003
-
Filesize
1KB
MD5c4aeb5264ecb325e767555218239fb6a
SHA11140439aa33a609e98cf2daed071dfc784cab5df
SHA2569970e7f998f05b076c13d3bf68c53331e2aa9e91adcc489cb07abdb26b9be83d
SHA512b61341f9dfc62b16f36d025a985e53f65c8e30c030e7102ad1d1292d29e4dc8ab4379c015a198a4d3fd80cdee7eb8a9f16902a467d4bb67c9d596b8b5b07b7ae
-
Filesize
526KB
MD5b3fadd7baa42de427c805f7077fb2270
SHA1ada8b158bdf2a2a8713471dc265cc4e1a5edcce6
SHA256ecbaf4fd33d364493df749f76310dc21ad4ab5f39a0564e2c7f90b470d5daad3
SHA5127f6e48a11ac67e1c47a8f9905754e13b4dffc0435a87f504480be31c52d44fdec47d6cb87148fae3b13f7944a5fd1fcc7eec9dae1c4dd1d1dfe2ceb1633dde1a