Analysis
-
max time kernel
126s -
max time network
141s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
25-01-2025 22:09
Static task
static1
Behavioral task
behavioral1
Sample
81eafae020d11af1482df37be37b64d767545d96a8c0dc984e797e77bb4150d9.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
81eafae020d11af1482df37be37b64d767545d96a8c0dc984e797e77bb4150d9.apk
Resource
android-x64-20240910-en
General
-
Target
81eafae020d11af1482df37be37b64d767545d96a8c0dc984e797e77bb4150d9.apk
-
Size
2.4MB
-
MD5
5e08c5a7d60370c95c758949361b5cfe
-
SHA1
7780f1a4bc197e6779011c55b3114b59becebb08
-
SHA256
81eafae020d11af1482df37be37b64d767545d96a8c0dc984e797e77bb4150d9
-
SHA512
101debb488acb8b5a789190ef15ab8d4c52312f7a83c923e4914f2208334e3533dd5f627e4e2e36b2c9c0a5658431258ecf93c50ae89322971b25cc865bbe5ca
-
SSDEEP
49152:7a0npvkXhRqD6imp7SOI3kKQB3HLrOTPVXuOiLVuIEOL5PZe8ap08nbFQ:nUqDJeS1kKu3HCP1uOEVuDOLnU08nbm
Malware Config
Extracted
octo
https://91.202.233.164/NzcxZWQ4MWEzZjRk/
https://694b64c9229d92124125w2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d921s23532adsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c99d921s3532sw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d9e2adsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c922153256dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d954362sw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229151312dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229135131dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d94663sw2.com/NzcxZWQ4MWEzZjRk/
Extracted
octo
https://91.202.233.164/NzcxZWQ4MWEzZjRk/
https://694b64c9229d92124125w2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d921s23532adsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c99d921s3532sw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d9e2adsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c922153256dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d954362sw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229151312dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229135131dsw2.com/NzcxZWQ4MWEzZjRk/
https://694b64c9229d94663sw2.com/NzcxZWQ4MWEzZjRk/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.portstudyylce/cache/cljbx 5136 com.portstudyylce /data/user/0/com.portstudyylce/cache/cljbx 5136 com.portstudyylce -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.portstudyylce Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.portstudyylce -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.portstudyylce -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.portstudyylce -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.portstudyylce android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.portstudyylce android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.portstudyylce android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.portstudyylce -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.portstudyylce -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.portstudyylce -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.portstudyylce
Processes
-
com.portstudyylce1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:5136
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5c0f72ea6acb6f49a5cd46d6395bfe858
SHA1cb8c8ac4524b29c1a4adaf8037856557cf1d0eea
SHA25665364f58693bac356feebfaf9bf506676908da7efce549405c06e40b4472a525
SHA512a647c5069d83563859942fe4a05af0b75e14770c0e0245e8b107607169d575c2816022d70e77b2c2cd5a8aeb897237da36a04e3c8e87aefa0072b07de237319e
-
Filesize
506B
MD54a8cf9f81813d80803af7f36818ecf97
SHA13068aca1fcb7c64fa7b3a9260fef5e1bc1af68cb
SHA256a8baacd2bfc31999e414ca8701684e8d2fed04438bd354483645c06609ece5c9
SHA5126f6e476056efd5896877b3717c303982dbb846ef7cd4409c03debea83b11eab32de0d5a9c17035de9a9dfd8fb4cf39eb2925f6e4dc6c971eac4ec3deda8c6c26