Analysis
-
max time kernel
148s -
max time network
153s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
22-01-2025 22:08
Static task
static1
Behavioral task
behavioral1
Sample
9631e0caff800bb316000df99497f081dac72a3345814364f2dcead772e86588.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
9631e0caff800bb316000df99497f081dac72a3345814364f2dcead772e86588.apk
Resource
android-x64-20240910-en
General
-
Target
9631e0caff800bb316000df99497f081dac72a3345814364f2dcead772e86588.apk
-
Size
2.3MB
-
MD5
0ed0a0d0afa3073d31f6ee23b5e9f387
-
SHA1
ca90d700cf3c1b69530237bf17c1c1d33a68aac2
-
SHA256
9631e0caff800bb316000df99497f081dac72a3345814364f2dcead772e86588
-
SHA512
0b6bd0a278864aa10dbb85ea56f44f17f9bc8191274cc21640939ba7268bcf6e81a2946007f1c5d5102ca18c4ec41ad330d2bd2befefab5b397ce7e82cb9adb9
-
SSDEEP
49152:wVl2o/wVPHUTZgihjssAdcG90K1hcmZGZbmqA2YM2ZP5VSFggcZPsNAE4KoSENE7:CIHUmEjh9GbpZQ/A/M2ZLCsVh8KMgQZn
Malware Config
Extracted
octo
https://vippivok.top/ZTZkNTJjNTkwYzk3/
https://bobnoopopo.org/ZTZkNTJjNTkwYzk3/
https://junggvrebvqqpo.org/ZTZkNTJjNTkwYzk3/
https://junggpervbvqqqqqqpo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvqqgrouppo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvqqnetokpo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvq.top/ZTZkNTJjNTkwYzk3/
https://junggvbvq5656.top/ZTZkNTJjNTkwYzk3/
https://jungjunjunggvbvq.top/ZTZkNTJjNTkwYzk3/
Extracted
octo
https://vippivok.top/ZTZkNTJjNTkwYzk3/
https://bobnoopopo.org/ZTZkNTJjNTkwYzk3/
https://junggvrebvqqpo.org/ZTZkNTJjNTkwYzk3/
https://junggpervbvqqqqqqpo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvqqgrouppo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvqqnetokpo.com/ZTZkNTJjNTkwYzk3/
https://junggvbvq.top/ZTZkNTJjNTkwYzk3/
https://junggvbvq5656.top/ZTZkNTJjNTkwYzk3/
https://jungjunjunggvbvq.top/ZTZkNTJjNTkwYzk3/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.partchildreny/app_DynamicOptDex/leqwOb.json 5205 com.partchildreny /data/user/0/com.partchildreny/cache/ftqkncc 5205 com.partchildreny /data/user/0/com.partchildreny/cache/ftqkncc 5205 com.partchildreny -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.partchildreny Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.partchildreny -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.partchildreny -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.partchildreny -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.partchildreny -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.partchildreny android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.partchildreny -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.partchildreny -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.partchildreny -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.partchildreny -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.partchildreny -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.partchildreny
Processes
-
com.partchildreny1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5205
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ac4629c4ac6652f2ff3bf6ec86fb6d40
SHA10cfe157072398959cfcfc8ddcd3b1bc0137f87aa
SHA256395c9993327e02d090eeeff1f292111d711c930edb710d1c2e1c5cc726631f80
SHA512a91fb05f2a56c811ac0826987769720bbdc41e4cf0ae47cec509e66baed86d48270d6b50ff0858619583c66b3d17a4ffadef5a3b3a1047b6dac14ddf81b48258
-
Filesize
1KB
MD526ed72bf37b30f750068fc58c4bb33c1
SHA1b703274b48fa6958009202a53de70ef2709f4550
SHA25647644b6ae298d27959787cc3e0d53b236074c427d8bdaf5df019c6161f9dc80e
SHA51263edbbc5efc01e22a72f96d65006c36d2a9230f8370fc7301c603743c8b713de79e465f2fec7d37afd00d5954dd7441a435b7f3be4746cd58faef2bb49421a5e
-
Filesize
448KB
MD571d7f546e0aa7feb8b5610052766ff0d
SHA19be6acd137c796c676f63ff3bfd835d48d6ccca4
SHA2560e3d7d3013a257de4c1656036ef786100a5a66ff53a4244fbe829467c49345f5
SHA5127481242d6e2fe5e4437bc3dc9f161df4b0a9641b571cb0a6baa093af8ad26fae63622b02b8dd83fcc15b3dc9ea8ccd00134f075031381b93b3793d591c509a87
-
Filesize
490B
MD53dc47380a29ffed74aa195e01ae37251
SHA1024a02630e477f6518b15b66f4f3e17daaae1d6f
SHA25634f6b3c51a108e4b6d1553a924fc16b7246ad60130de1c2ab8bda6d0b37dbeb8
SHA5122a6541f60e673a493681013578e65b08b9138821ce539c9a54385755aa8ff748515d3815903e3895addd042a8f6608ae32a9d36d10f8abaf73e0ceace58efbb5
-
Filesize
437B
MD572bb4e6f32119522608baf1860678b03
SHA13bc61d7901897473434d43067c9e198136a5bcb7
SHA25653501b53658edea3844fc9dafa5a8f84642dc4a5d443652f519cf83e1ccf449c
SHA512eb49272d2c68c9ddb71b4888c0f06706da0896bc4039ab022c56725358d467023c513a2e08d0461158ef70305dc9c874eaca952f1ac504e748d6b6dbd49035e7
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD5bcd361b412455bc433cfbd9d76d06ab3
SHA18b93379a647fb36e5644f427a243f1aa3216d5e8
SHA256edaeb04d4d5157000e46942d5e3de46e598b468934b9b09fab44ef762fd18b15
SHA5129413c9166cb561a4d9042f2225639efc6fdee633c558711579a66a15c3f1ffb6b051d323b0636106c5348171ad9cffc92a353a694ab2ed7f94f379e527f02590
-
Filesize
45B
MD5e764307efd3cddda35adfe318e03fe34
SHA11e1d30d81c8db62a1fb9e4301fccc82e8644b68b
SHA2568817c419e86c4b925137c2332633c8db1a13adedbf59ff0f0614fd8c59f77de5
SHA512b60e76851e677ec1505512e5805a2ff76f7ba0a9931d9af69f2e3746db66bcba3e368a0731f1968759b42d19dbabd6af59c65066a10b6332526442440dc05aa5
-
Filesize
63B
MD594869bb8daf948dcba0ce5071484908e
SHA1a68555c2a3038166f40e486bcbd22d48e26803fd
SHA256e8f832add841502afde00ac11b83b55956916e79df20cfe5703cab240c33119d
SHA512ce6d7bec75827dea0efecee309e7e2da3218a548e75ec701706082dacfce493cb3f3bf482792d6a27d6b7e593af54dcadb0cc3b71aa11aeddbdfdb90f065bffd
-
Filesize
2KB
MD594a37570a6ad7d7c4cf52701e441ea59
SHA18933f5345481404b26f01d048731b8c9a45ec8bb
SHA256f21e111bca4dd245be46e019829339d3c71619b6a30be94dc19a5f2f46095e1d
SHA5120614911af7c953e36ce23dfc3b82e7b0edcb7077671b339263ed657549a1e519fccef8230a88951af8ee343aecb842c3d18256e5af83bb3e2baa8736dee17d1b