Analysis
-
max time kernel
149s -
max time network
156s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
22-01-2025 22:08
Static task
static1
Behavioral task
behavioral1
Sample
9631e0caff800bb316000df99497f081dac72a3345814364f2dcead772e86588.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
9631e0caff800bb316000df99497f081dac72a3345814364f2dcead772e86588.apk
Resource
android-x64-20240910-en
General
-
Target
9631e0caff800bb316000df99497f081dac72a3345814364f2dcead772e86588.apk
-
Size
2.3MB
-
MD5
0ed0a0d0afa3073d31f6ee23b5e9f387
-
SHA1
ca90d700cf3c1b69530237bf17c1c1d33a68aac2
-
SHA256
9631e0caff800bb316000df99497f081dac72a3345814364f2dcead772e86588
-
SHA512
0b6bd0a278864aa10dbb85ea56f44f17f9bc8191274cc21640939ba7268bcf6e81a2946007f1c5d5102ca18c4ec41ad330d2bd2befefab5b397ce7e82cb9adb9
-
SSDEEP
49152:wVl2o/wVPHUTZgihjssAdcG90K1hcmZGZbmqA2YM2ZP5VSFggcZPsNAE4KoSENE7:CIHUmEjh9GbpZQ/A/M2ZLCsVh8KMgQZn
Malware Config
Extracted
octo
https://vippivok.top/ZTZkNTJjNTkwYzk3/
https://bobnoopopo.org/ZTZkNTJjNTkwYzk3/
https://junggvrebvqqpo.org/ZTZkNTJjNTkwYzk3/
https://junggpervbvqqqqqqpo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvqqgrouppo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvqqnetokpo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvq.top/ZTZkNTJjNTkwYzk3/
https://junggvbvq5656.top/ZTZkNTJjNTkwYzk3/
https://jungjunjunggvbvq.top/ZTZkNTJjNTkwYzk3/
Extracted
octo
https://vippivok.top/ZTZkNTJjNTkwYzk3/
https://bobnoopopo.org/ZTZkNTJjNTkwYzk3/
https://junggvrebvqqpo.org/ZTZkNTJjNTkwYzk3/
https://junggpervbvqqqqqqpo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvqqgrouppo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvqqnetokpo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvq.top/ZTZkNTJjNTkwYzk3/
https://junggvbvq5656.top/ZTZkNTJjNTkwYzk3/
https://jungjunjunggvbvq.top/ZTZkNTJjNTkwYzk3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-6.dat family_octo -
pid Process 4214 com.partchildreny -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.partchildreny/app_DynamicOptDex/leqwOb.json 4239 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.partchildreny/app_DynamicOptDex/leqwOb.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.partchildreny/app_DynamicOptDex/oat/x86/leqwOb.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.partchildreny/app_DynamicOptDex/leqwOb.json 4214 com.partchildreny /data/user/0/com.partchildreny/cache/ftqkncc 4214 com.partchildreny /data/user/0/com.partchildreny/cache/ftqkncc 4214 com.partchildreny -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.partchildreny Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.partchildreny -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.partchildreny -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.partchildreny -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.partchildreny android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.partchildreny -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.partchildreny -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.partchildreny -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.partchildreny -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.partchildreny -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.partchildreny -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.partchildreny -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.partchildreny
Processes
-
com.partchildreny1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4214 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.partchildreny/app_DynamicOptDex/leqwOb.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.partchildreny/app_DynamicOptDex/oat/x86/leqwOb.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4239
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ac4629c4ac6652f2ff3bf6ec86fb6d40
SHA10cfe157072398959cfcfc8ddcd3b1bc0137f87aa
SHA256395c9993327e02d090eeeff1f292111d711c930edb710d1c2e1c5cc726631f80
SHA512a91fb05f2a56c811ac0826987769720bbdc41e4cf0ae47cec509e66baed86d48270d6b50ff0858619583c66b3d17a4ffadef5a3b3a1047b6dac14ddf81b48258
-
Filesize
1KB
MD526ed72bf37b30f750068fc58c4bb33c1
SHA1b703274b48fa6958009202a53de70ef2709f4550
SHA25647644b6ae298d27959787cc3e0d53b236074c427d8bdaf5df019c6161f9dc80e
SHA51263edbbc5efc01e22a72f96d65006c36d2a9230f8370fc7301c603743c8b713de79e465f2fec7d37afd00d5954dd7441a435b7f3be4746cd58faef2bb49421a5e
-
Filesize
448KB
MD571d7f546e0aa7feb8b5610052766ff0d
SHA19be6acd137c796c676f63ff3bfd835d48d6ccca4
SHA2560e3d7d3013a257de4c1656036ef786100a5a66ff53a4244fbe829467c49345f5
SHA5127481242d6e2fe5e4437bc3dc9f161df4b0a9641b571cb0a6baa093af8ad26fae63622b02b8dd83fcc15b3dc9ea8ccd00134f075031381b93b3793d591c509a87
-
Filesize
494B
MD59bf3b7549889e0384287cffd3539e241
SHA10b54ecce0cfd2a7135e355ba22261003b2de9365
SHA256a2a27b222ba1d88af118eed26da785b5e361a79fbae355c9f9a8597a470318c0
SHA51221804fc885008f21ada3e8929c5cae8711fdedcdff1f104e66304367c90f8441621a4467114b38122272eca56b6a567e2b1b75cff6e44959ef795013d6939818
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD59f51bf25dd07912e1d13c23c0c4fac60
SHA1c6f327edb7ed9bc518a04d7719cbda9138c08dde
SHA256deaa7299a141a6b93639e90e42d68d256fd2cb802c1ee1b274f0e56c5e6f0be4
SHA512a494799904bb7410c076b1f1ab7c29f1183257076d01be6ce852baacabaa274759f7331508cce17416ad1a340cafd68bbde3b2a2ddfa22ba8552567222baa7ba
-
Filesize
54B
MD575e64c0ea45564f5ab32a1ecd73d194a
SHA1df538fe3098e38d8d87989eaa65a82f74ae6f15b
SHA256a65b33c0a196503875c1192b33a8c38de58e5cf9eedbb3a89a580936bb920ca7
SHA51269160b4b32d827b382038d36f5ba2b06ac13fdbb5994bc1a9e0b0f227ef4212a9580aae692de77bba52640e6b9579ea9c39eb15a730824b7e11bca46013c5ebb
-
Filesize
63B
MD581e0ac084b9b5e567c6b344053786b65
SHA1e87609d03957aa40fcab0581720f1ec26dd71e5b
SHA2563009086d4021b1effbaa83be3d984109113659eb1c814680983292910729b802
SHA5128880f158e534a05b8f148ddabf590733620051192cc63efefb1382828430b4c770ebfc1c96ca0cfedd4a26e15c68c000fb6224ea51fb9fa45078de5985da14ee
-
Filesize
437B
MD5abe13bc02d393c618af824695c6f14bc
SHA1f92cfe0ab49dbd3087cd9096156ed035a7d2ed18
SHA2564929472223c67ac5cb65bbdf1c065dd852329d4d62ec9219b9abefc14970d83f
SHA512e6cd077800b27c37eb1e9a3c88ecdadf1a0f36e79eb4d2f768f865910dc495363274a2e0b3fdbd4bfdb79706b079f89713336273237b5b7b894678b6c5e1fb1b
-
Filesize
2KB
MD528f7f73f9f1712afb5a8f1d2f0f321ba
SHA13399ead2f1b5f1eea16a906bf8c6cbe219d8c5aa
SHA256f5f0d84ac04381467b1bb5fe03313ff5175e88e4fee6374f12392f0a475818f6
SHA512f40d8c3952c6eecccc7011dee68a05d366c67a0f215976dab3ebcb721bfeaa94177774afd088f4e9431cb0858b43b8d139e88ce6607d2783a485aba5297bf751
-
Filesize
2KB
MD594a37570a6ad7d7c4cf52701e441ea59
SHA18933f5345481404b26f01d048731b8c9a45ec8bb
SHA256f21e111bca4dd245be46e019829339d3c71619b6a30be94dc19a5f2f46095e1d
SHA5120614911af7c953e36ce23dfc3b82e7b0edcb7077671b339263ed657549a1e519fccef8230a88951af8ee343aecb842c3d18256e5af83bb3e2baa8736dee17d1b