Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    05/02/2025, 22:08

General

  • Target

    9854b26d5ec65e754a7dbd912bad288fe4b2f6c869920dd8fdcd462f5153f276.apk

  • Size

    2.4MB

  • MD5

    8b0ebb250f1c6b26fe254a6256d88ece

  • SHA1

    ebb7061c2e400979fb0b0296c817e7fc476bfc96

  • SHA256

    9854b26d5ec65e754a7dbd912bad288fe4b2f6c869920dd8fdcd462f5153f276

  • SHA512

    c157fdf90ad15d3b5d586312595458cbf71784bd8e7f3a5c1c78c32be3a210b88017e1b3201d9e80f40b1b844722631dc919a48473830c87809c4187a79e94a3

  • SSDEEP

    49152:CvHDSl8Rb/N/ZYlTTPlci/llf2rPNu1iwr12U50yU/AF3t8Ck0DNx19mhJwx:ED3Rb/Lob/7ePfwZ/gARpl

Malware Config

Extracted

Family

octo

C2

https://91.202.233.164/NzcxZWQ4MWEzZjRk/

https://694b64c9229d92124125w2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d921s23532adsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c99d921s3532sw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d9e2adsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c922153256dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d954362sw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229151312dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229135131dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d94663sw2.com/NzcxZWQ4MWEzZjRk/

rc4.plain

Extracted

Family

octo

C2

https://91.202.233.164/NzcxZWQ4MWEzZjRk/

https://694b64c9229d92124125w2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d921s23532adsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c99d921s3532sw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d9e2adsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c922153256dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d954362sw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229151312dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229135131dsw2.com/NzcxZWQ4MWEzZjRk/

https://694b64c9229d94663sw2.com/NzcxZWQ4MWEzZjRk/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.governneary
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4266

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.governneary/cache/gcddozqtpuba

    Filesize

    2.3MB

    MD5

    dfc7478adff272381bad4cb469c317a5

    SHA1

    2324fdc1875a639a8b5b82694f42a0e2aa3f5e24

    SHA256

    abc69caa454f276d1028e02be5f4d9b31d67cd5a8de5779521c3ef07acadfbab

    SHA512

    3363aefba1bb09ecb3b5205c3b10af1ff7948c0d1eb8d8c1e7c14150ccbfb9fa93cfaeb07d62f659f85e8b34188da23375c750ffbe0e8c545d6189fe1980f331

  • /data/data/com.governneary/cache/oat/gcddozqtpuba.cur.prof

    Filesize

    534B

    MD5

    2a468065bbdf72f50b8363b637b6fea8

    SHA1

    b3f2ebeda0df0d9bad367990e63a19c3434dec35

    SHA256

    3265d6d2784f2110a56fac5f927f8d34473d4cf934132258dab27d14e4cb7e91

    SHA512

    9f7854c31b5f9323a11c1b1ef67742c60e0a31ee6a447e52affda3cd49f9fdf7f0e827afbcc5a2589ef004ecbc0cabb2f99859261677adf91d5ced96ef88d4c3