Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    05/02/2025, 22:11

General

  • Target

    56ccbc724908b19533e4cfea5de1ce7b22edc42639aa8f2d4574dc8f3bf14872.apk

  • Size

    2.1MB

  • MD5

    b935420af048db251cda638382ca6e85

  • SHA1

    ca61c228c6e04a406d672d9cdd80c3ff9a9afe90

  • SHA256

    56ccbc724908b19533e4cfea5de1ce7b22edc42639aa8f2d4574dc8f3bf14872

  • SHA512

    60d59cd67133db69dbd198b4c65bb3c1d9ddf9f277ce3cea53c315cf4638b4f727768dfcf74403d497a4f73f836e072198e751bd744d3bf0416fd45d19341488

  • SSDEEP

    49152:UEnjI0g+egD/REE9PSFEk7+7M1B5NM66aSmXAjKgRW2IJy9s:UKjI0g+j/eE90i7M35ixa6Kgg2N9s

Malware Config

Extracted

Family

octo

C2

https://numberonegizemler.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerbilgilendirme.xyz/MzhiMTg0NTAwOTY5S/

https://kkcaneryolculuk.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanertarihcesi.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerkesifleri.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanersahnesi.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanergundemi.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanersohbet.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanervizyon.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerseruven.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerpenceresi.xyz/MzhiMTg0NTAwOTY5S/

https://kkcaneryorumlari.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerhikayeleri.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerplatform.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerpaylasim.xyz/MzhiMTg0NTAwOTY5S/

https://kkcaneranaliz.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanericgorus.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerincelemeleri.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerodulleri.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanergelecek.xyz/MzhiMTg0NTAwOTY5S/

rc4.plain

Extracted

Family

octo

C2

https://numberonegizemler.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerbilgilendirme.xyz/MzhiMTg0NTAwOTY5S/

https://kkcaneryolculuk.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanertarihcesi.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerkesifleri.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanersahnesi.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanergundemi.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanersohbet.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanervizyon.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerseruven.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerpenceresi.xyz/MzhiMTg0NTAwOTY5S/

https://kkcaneryorumlari.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerhikayeleri.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerplatform.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerpaylasim.xyz/MzhiMTg0NTAwOTY5S/

https://kkcaneranaliz.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanericgorus.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerincelemeleri.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanerodulleri.xyz/MzhiMTg0NTAwOTY5S/

https://kkcanergelecek.xyz/MzhiMTg0NTAwOTY5S/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.fame.giraffe
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4333
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fame.giraffe/app_true/roYDSxc.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.fame.giraffe/app_true/oat/x86/roYDSxc.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4358

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.fame.giraffe/app_true/roYDSxc.json

    Filesize

    153KB

    MD5

    2f344cff7bd9968e70423200a7cfeef4

    SHA1

    70b56a5aa5734159ed3ac85fff33c24191c55b26

    SHA256

    08afb9b93c11ea4a69b93553f97109653c0481622822b5b9feb5e705e5cebc3f

    SHA512

    08cbaea75c55ae4c6c5e7865c60c2bccf1dcf4d0c06aeeba0d27099edd6ede89020cbaf6dcc829cb3ab90beb5520f3e12734dc576f7a931c28289ad924e20efd

  • /data/data/com.fame.giraffe/app_true/roYDSxc.json

    Filesize

    153KB

    MD5

    46e4304a9846110c33a31575c074389a

    SHA1

    5d0ad74eec9a07a961ad0632815d5ec3885c4adc

    SHA256

    822a876ea5ca996b0d247bf95ffeb8391cf1d9c27f0f1114ff37af0625f3470c

    SHA512

    cef8b3646fbadc08965ccbab751fe985ad68826858af41c0456d660063eaebfcbfbbf3a9c21944b6e56a4a2cd98f7119abd5800ebf90be558ffe46614ba3d606

  • /data/user/0/com.fame.giraffe/app_true/roYDSxc.json

    Filesize

    450KB

    MD5

    343b23f0fdd0cc8625766f9f83838066

    SHA1

    7337daf9414ac1a3eee2275e9091f098b8d45eab

    SHA256

    ceddb8b2a4632b0a09a7c55d71c58e90deec8f047a6ae91cebffe000798670ef

    SHA512

    ae5765bba4a1454fa091ab4dcf68ebd0dd99b9cfda7f42a0822836475022fecf627d92ffcc9e45f80434b1c5304c77eb52672ed011ca67fd1c8203b0229b39ac

  • /data/user/0/com.fame.giraffe/app_true/roYDSxc.json

    Filesize

    450KB

    MD5

    1fc0ea02afb34c62955b29f36092c6fd

    SHA1

    4f08cfd01d146e4425f3d5a6303c9e1407e1941f

    SHA256

    39b0fac600eb933f7c0b2746604748da92c83dee6d86ffffc3643ae0b2259ac2

    SHA512

    3b00278c44987fc9b6527060b3545288bc908fb2e8037851a2ad8bcd26fb6e9d53d7712d5971a10b7e6d54875a10cf5255dde1457d2f50f54795a1eb9d24978e