Analysis
-
max time kernel
140s -
max time network
153s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
21/01/2025, 07:01 UTC
Static task
static1
Behavioral task
behavioral1
Sample
file.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
file.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
file.apk
-
Size
4.9MB
-
MD5
43f9eeac1c179a77aea280a58395c62d
-
SHA1
6fba4e8760950633ae7cf1f95b59683327de200a
-
SHA256
11cb449075fc408540e0c03733c296739373098ce998033ce5b2dee2e6188e50
-
SHA512
359cc66b5a85fc40b965f75c4cbb1cf41009fa00ada2bdce39b9898063a521518b257aaa6053506c1209bfa02cb48ade8d1c767a4660e803b0403d36cf371dd0
-
SSDEEP
49152:PRsEXLOLKrsj7A45iS7xrGovp8dpjjVKScIyj/JVP0c6vf5sCxxpT0:PRsxisj7Z5iSRG/fVKFbPP6vftx0
Malware Config
Extracted
octo
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/memory/4474-0.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.fksource_api0/Anonymous-DexFile@669734141.jar 4474 com.fksource_api0 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.fksource_api0 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.fksource_api0 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.fksource_api0 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.fksource_api0 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.fksource_api0 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.fksource_api0 -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.fksource_api0 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.fksource_api0 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.fksource_api0 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.fksource_api0
Processes
-
com.fksource_api01⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4474
Network
-
Remote address:1.1.1.1:53Requestandroid.apis.google.comIN AResponseandroid.apis.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A216.58.204.78
-
Remote address:1.1.1.1:53Requestfce400ee5ee2692a18f4b26bac549135.xyzIN AResponsefce400ee5ee2692a18f4b26bac549135.xyzIN A188.40.187.129
-
Remote address:188.40.187.129:443RequestPOST / HTTP/2.0
host: fce400ee5ee2692a18f4b26bac549135.xyz
cache-control: no-cache
packets-sent: 4222356183
content-type: application/octet-stream; charset=utf-8
content-length: 10101
accept-encoding: gzip
user-agent: okhttp/4.12.0
ResponseHTTP/2.0 404
x-content-type-options: nosniff
content-length: 19
date: Tue, 21 Jan 2025 07:01:58 GMT
-
Remote address:1.1.1.1:53Requestssl.google-analytics.comIN AResponsessl.google-analytics.comIN A142.250.200.40
-
Remote address:188.40.187.129:443RequestPOST / HTTP/2.0
host: fce400ee5ee2692a18f4b26bac549135.xyz
cache-control: no-cache
packets-sent: 6549106183
content-type: application/octet-stream; charset=utf-8
content-length: 10101
accept-encoding: gzip
user-agent: okhttp/4.12.0
ResponseHTTP/2.0 404
x-content-type-options: nosniff
content-length: 19
date: Tue, 21 Jan 2025 07:02:12 GMT
-
Remote address:188.40.187.129:443RequestPOST / HTTP/2.0
host: fce400ee5ee2692a18f4b26bac549135.xyz
cache-control: no-cache
packets-sent: 4222356183
content-type: application/octet-stream; charset=utf-8
content-length: 10101
accept-encoding: gzip
user-agent: okhttp/4.12.0
ResponseHTTP/2.0 404
x-content-type-options: nosniff
content-length: 19
date: Tue, 21 Jan 2025 07:02:58 GMT
-
Remote address:188.40.187.129:443RequestPOST / HTTP/2.0
host: fce400ee5ee2692a18f4b26bac549135.xyz
cache-control: no-cache
packets-sent: 6549106183
content-type: application/octet-stream; charset=utf-8
content-length: 10101
accept-encoding: gzip
user-agent: okhttp/4.12.0
ResponseHTTP/2.0 404
x-content-type-options: nosniff
content-length: 19
date: Tue, 21 Jan 2025 07:03:01 GMT
-
Remote address:188.40.187.129:443RequestPOST / HTTP/2.0
host: fce400ee5ee2692a18f4b26bac549135.xyz
cache-control: no-cache
packets-sent: 6549106183
content-type: application/octet-stream; charset=utf-8
content-length: 10101
accept-encoding: gzip
user-agent: okhttp/4.12.0
ResponseHTTP/2.0 404
x-content-type-options: nosniff
content-length: 19
date: Tue, 21 Jan 2025 07:03:13 GMT
-
Remote address:188.40.187.129:443RequestPOST / HTTP/2.0
host: fce400ee5ee2692a18f4b26bac549135.xyz
cache-control: no-cache
packets-sent: 4222356183
content-type: application/octet-stream; charset=utf-8
content-length: 10101
accept-encoding: gzip
user-agent: okhttp/4.12.0
ResponseHTTP/2.0 404
x-content-type-options: nosniff
content-length: 19
date: Tue, 21 Jan 2025 07:03:59 GMT
-
Remote address:188.40.187.129:443RequestPOST / HTTP/2.0
host: fce400ee5ee2692a18f4b26bac549135.xyz
cache-control: no-cache
packets-sent: 6549106183
content-type: application/octet-stream; charset=utf-8
content-length: 10101
accept-encoding: gzip
user-agent: okhttp/4.12.0
ResponseHTTP/2.0 404
x-content-type-options: nosniff
content-length: 19
date: Tue, 21 Jan 2025 07:04:01 GMT
-
Remote address:188.40.187.129:443RequestPOST / HTTP/2.0
host: fce400ee5ee2692a18f4b26bac549135.xyz
cache-control: no-cache
packets-sent: 6549106183
content-type: application/octet-stream; charset=utf-8
content-length: 10101
accept-encoding: gzip
user-agent: okhttp/4.12.0
ResponseHTTP/2.0 404
x-content-type-options: nosniff
content-length: 19
date: Tue, 21 Jan 2025 07:04:05 GMT
-
Remote address:188.40.187.129:443RequestPOST / HTTP/2.0
host: fce400ee5ee2692a18f4b26bac549135.xyz
cache-control: no-cache
packets-sent: 6549106183
content-type: application/octet-stream; charset=utf-8
content-length: 10101
accept-encoding: gzip
user-agent: okhttp/4.12.0
ResponseHTTP/2.0 404
x-content-type-options: nosniff
content-length: 19
date: Tue, 21 Jan 2025 07:04:13 GMT
-
1.5kB 40 B 1 1
-
1.5kB 40 B 1 1
-
4.7kB 7.8kB 19 19
-
12.0kB 3.1kB 18 17
HTTP Request
POST https://fce400ee5ee2692a18f4b26bac549135.xyz/HTTP Response
404 -
1.3kB 6.3kB 9 9
-
12.0kB 1.7kB 18 17
HTTP Request
POST https://fce400ee5ee2692a18f4b26bac549135.xyz/HTTP Response
404 -
846 B 40 B 2 1
-
11.2kB 12.4kB 31 39
-
22.6kB 2.5kB 25 30
HTTP Request
POST https://fce400ee5ee2692a18f4b26bac549135.xyz/HTTP Response
404HTTP Request
POST https://fce400ee5ee2692a18f4b26bac549135.xyz/HTTP Response
404 -
12.2kB 1.8kB 21 20
HTTP Request
POST https://fce400ee5ee2692a18f4b26bac549135.xyz/HTTP Response
404 -
44.0kB 3.3kB 45 39
HTTP Request
POST https://fce400ee5ee2692a18f4b26bac549135.xyz/HTTP Response
404HTTP Request
POST https://fce400ee5ee2692a18f4b26bac549135.xyz/HTTP Response
404HTTP Request
POST https://fce400ee5ee2692a18f4b26bac549135.xyz/HTTP Response
404HTTP Request
POST https://fce400ee5ee2692a18f4b26bac549135.xyz/HTTP Response
404
-
3.7kB 11
-
69 B 109 B 1 1
DNS Request
android.apis.google.com
DNS Response
216.58.204.78
-
82 B 98 B 1 1
DNS Request
fce400ee5ee2692a18f4b26bac549135.xyz
DNS Response
188.40.187.129
-
70 B 86 B 1 1
DNS Request
ssl.google-analytics.com
DNS Response
142.250.200.40
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
322KB
MD577dc50489b9323274732d27dc8a4e803
SHA10e02a3595b62489d0739d771881da8604d117c65
SHA256c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820
SHA5120684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58
-
Filesize
346B
MD5d644603b48044a18e9518b993413f2cc
SHA1d35960a278191bcdd649bbc5d9acc9d95103213b
SHA256c63f90ca2bbc1cfde0e8d25150c81a5ecffdba75ed478be1591a7e80114f1d12
SHA5126ba2123576030f9aecf22c70424f52f2c8c85ed31595fce0367c96a818257a40f7025aa855dec5d07ed5414d5e54a122d24b2f519cc4fc6f72ebf71442f6caef
-
Filesize
525KB
MD51af93a1d8c39ce6955ea47fcf9a12cb2
SHA19e8b1cdb6746e9932d39bdf55888574c334ee73f
SHA2561db8be5876f4285996950f0a5cb4d56c2df01ae99bc3361dc600f7fc95786845
SHA5129e1ffb8b4fd3df802f9c08f4a1c87bd4549cb7b72c1cd57c2c703a716ba9a47ba7e01794325c108442decca26666ea7e23cbefe06836925e908638576970f082