Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    23-01-2025 22:03

General

  • Target

    39654ed82e65d17c4108201b02e6b487a065752a9d612307803818644a069948.apk

  • Size

    2.4MB

  • MD5

    aec84c4647f5fb22b147fb274b00a404

  • SHA1

    ba327b6181fada516c35d0d7ee3e57fc9735af41

  • SHA256

    39654ed82e65d17c4108201b02e6b487a065752a9d612307803818644a069948

  • SHA512

    a6e175df6d810356c3f8d79df146834d9a8913aa71b1fd7700345144d9ad08af203f72d369942bc66c4f3266b391cd0cebb228d63216915f37564330274b59ac

  • SSDEEP

    49152:GvIlMvsfA0DyxAMv6J5M3a/ECFZZOzhlqRaMrR/QouY5qY9JRb4mb5lBOZAv8fGY:GvImvkA18Ca/9FZZOzhgrR8qqMmmoDus

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.certain.sphere
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4314
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.certain.sphere/app_dose/alj.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.certain.sphere/app_dose/oat/x86/alj.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4339

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.certain.sphere/app_dose/alj.json

    Filesize

    153KB

    MD5

    fcdfe49ff043fb3eb7b19b7f5304c17b

    SHA1

    ec41f23f126770019bfed7fad1aff49d560d13f5

    SHA256

    6b776684ade120eb7a15ab7751d501d96bc41201044ce70397b19f15b798c3dc

    SHA512

    546ff269c5abc7d08583dff4935ae65b24f735bb0df578f68ead8c65cff9fa3ca236d19e5841baff09332099751bf2f3c069ed153e7f2a5f043e426fd985b0d7

  • /data/data/com.certain.sphere/app_dose/alj.json

    Filesize

    153KB

    MD5

    27d6ea01a9d89e21eb5ac63619446821

    SHA1

    89549eab21f0f0fd96021620543c53bb3937a842

    SHA256

    988ecd3643f3a60c4d1deabcf6b240fb8fc999a2bdde9e8a090c8503cfd3b1c0

    SHA512

    e9255d0f5bb4a3bd91975d4930bd0fff1638a4ced99b356b3eced2b061237b10b096b5188aec4a0ad703d75d850253ee937170a857257d99398e730af2726af2

  • /data/user/0/com.certain.sphere/app_dose/alj.json

    Filesize

    450KB

    MD5

    c0449c4ef5f0b7f91a9b9808e9d768bb

    SHA1

    1edd7d172f001dcd9c392e7234796436a34b62a1

    SHA256

    2290db76a4c0559c142075fd32ce13e7ed6d412ef3d95868dd8cd3582a764f81

    SHA512

    a061e074dc73d084181996af2fe9ed350d6f9a4ed47fa4a8fff5cb717762439675ec7ed834c9f8ee808116cfeb98c889cd835a9f3f56826f6d17f2f79c5abb21

  • /data/user/0/com.certain.sphere/app_dose/alj.json

    Filesize

    450KB

    MD5

    73119366cddd9951f2b0558aba9258a1

    SHA1

    00e42a06b97d0564ae542f78283ba55c40606fe3

    SHA256

    6f7e3ff62fec85950a96b89d47c73e8df5faa48f77167618744446acf3845f28

    SHA512

    ded2923abd29fd868ca6c4dde8ed5090d1f100d887e040905490f99c8d38935b1519616d3caa8d5b3c68a05157639eb24941c594d219fc2aff5ed377dfddbba5