Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
07/02/2025, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
fc34bc71f9406cf54d1be581e12b3564d94154b398c8848901ca6e5312955c67.apk
Resource
android-x86-arm-20240910-en
General
-
Target
fc34bc71f9406cf54d1be581e12b3564d94154b398c8848901ca6e5312955c67.apk
-
Size
399KB
-
MD5
5cbfce36877811cf6de5782ba98625f9
-
SHA1
c42fb7eb3edf28e676eeb846378263ad1b556ff6
-
SHA256
fc34bc71f9406cf54d1be581e12b3564d94154b398c8848901ca6e5312955c67
-
SHA512
6359ec1945435a29ea61fbb3aae0e8626b2de1e494cd1368151a3c103dc0cb13707ef603aed3e6113f26902ebe0d55de315c75514883df59d538d5181e2fff0d
-
SSDEEP
12288:pg0Sj82uYjex7UVJXExXis2bCNfOL/JDpO:pg3jxLjwUVJXEKx7Jo
Malware Config
Extracted
octo
https://crystalhorizon.xyz/YTE5MzQ1ZWRkZjY1/
https://velvetdawn.xyz/YTE5MzQ1ZWRkZjY1/
https://shadowmist.xyz/YTE5MzQ1ZWRkZjY1/
https://whisperingvale.xyz/YTE5MzQ1ZWRkZjY1/
https://stormyclouds.xyz/YTE5MzQ1ZWRkZjY1/
https://sunsetmirage.xyz/YTE5MzQ1ZWRkZjY1/
https://goldenflare.xyz/YTE5MzQ1ZWRkZjY1/
https://frozendreams.xyz/YTE5MzQ1ZWRkZjY1/
https://midnightwhisper.xyz/YTE5MzQ1ZWRkZjY1/
https://seraphiclight.xyz/YTE5MzQ1ZWRkZjY1/
https://twilightstorm.xyz/YTE5MzQ1ZWRkZjY1/
https://azurehaven.xyz/YTE5MzQ1ZWRkZjY1/
https://lunarshade.xyz/YTE5MzQ1ZWRkZjY1/
Extracted
octo
https://crystalhorizon.xyz/YTE5MzQ1ZWRkZjY1/
https://velvetdawn.xyz/YTE5MzQ1ZWRkZjY1/
https://shadowmist.xyz/YTE5MzQ1ZWRkZjY1/
https://whisperingvale.xyz/YTE5MzQ1ZWRkZjY1/
https://stormyclouds.xyz/YTE5MzQ1ZWRkZjY1/
https://sunsetmirage.xyz/YTE5MzQ1ZWRkZjY1/
https://goldenflare.xyz/YTE5MzQ1ZWRkZjY1/
https://frozendreams.xyz/YTE5MzQ1ZWRkZjY1/
https://midnightwhisper.xyz/YTE5MzQ1ZWRkZjY1/
https://seraphiclight.xyz/YTE5MzQ1ZWRkZjY1/
https://twilightstorm.xyz/YTE5MzQ1ZWRkZjY1/
https://azurehaven.xyz/YTE5MzQ1ZWRkZjY1/
https://lunarshade.xyz/YTE5MzQ1ZWRkZjY1/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_octo behavioral1/memory/4345-1.dex family_octo -
pid Process 4345 com.sgakagak.agakagabs -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sgakagak.agakagabs/files/arm/classes.dex 4345 com.sgakagak.agakagabs /data/user/0/com.sgakagak.agakagabs/files/arm/classes.dex 4371 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sgakagak.agakagabs/files/arm/classes.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.sgakagak.agakagabs/files/arm/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.sgakagak.agakagabs/files/arm/classes.dex 4345 com.sgakagak.agakagabs -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sgakagak.agakagabs Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sgakagak.agakagabs -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sgakagak.agakagabs -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sgakagak.agakagabs -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sgakagak.agakagabs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sgakagak.agakagabs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sgakagak.agakagabs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sgakagak.agakagabs -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sgakagak.agakagabs -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.sgakagak.agakagabs -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.sgakagak.agakagabs -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.sgakagak.agakagabs -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sgakagak.agakagabs -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sgakagak.agakagabs
Processes
-
com.sgakagak.agakagabs1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4345 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sgakagak.agakagabs/files/arm/classes.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.sgakagak.agakagabs/files/arm/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4371
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
451KB
MD5445c60939d9655a172d37b313e0e01d3
SHA109c1a4f6f30ad01781eabc0d5e983d26e63951b7
SHA256b7cbb58cc007adf839f03e9a574bc86a92fc5627fd7845960c8d4c17ec1ded43
SHA512b80138723d30b8d143cf7dd4d3acdbf87eaf978b962f80ba4a74dfa9eb8b0c051982aeb66ac523b351828b861df63d8620e2bb6b21de6c117f9a62f19b916933
-
Filesize
451KB
MD50f9b1b614cc8b73f59fbf97205d83b34
SHA13f5e116223e11ffd1e50c9e24977ee35b10fcf4e
SHA25663bc09430ba1a0f98ebcdbb0b02bf62d5bc95176bb48a718883e8ff0999ffaf5
SHA5125047dfd03dd9c3683c64693d9d3342f32e89cc3eeaa263ed209f7a4bcd768260556d2e962eb7eb575f822d5ee16174890569e97a877c6984f71920d22c692d06