Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    09/02/2025, 22:03

General

  • Target

    a124e759774105e8ace189aa7a538f414d40e51b45b964e56602b9b5a4c03393.apk

  • Size

    2.9MB

  • MD5

    65c9c0780a66a5145ec40e650eeff457

  • SHA1

    459f4af59a66b085f004b2307645c8e6310da972

  • SHA256

    a124e759774105e8ace189aa7a538f414d40e51b45b964e56602b9b5a4c03393

  • SHA512

    c9db220c2688dfd161df029dde5608baad8e663c253c48762ce37455b4abd8e17f67db7db3d9fd9fa988bf5e759e01a00acfbfd5698fa78e6fbba396849e3a9e

  • SSDEEP

    49152:THyu7IEG81t/vk1CG254cM86RpQsv+/hx1SpgLyZ6EQM8XANkT+lzI6HpHGb4dUG:mpEG8jvZL5DM8Cp9+JOguZ6Eh36+ZI6p

Malware Config

Extracted

Family

octo

C2

https://91.215.85.142/NTA4MzIxMjdkYzNj/

https://edfwn923sfdml237vm90sdl23k.com/NTA4MzIxMjdkYzNj/

https://823jkfs4829nk48kef742kj675.com/NTA4MzIxMjdkYzNj/

https://sdglk33498knsf32667sfknwfr.com/NTA4MzIxMjdkYzNj/

https://952dsjk47kf73ls23k489klfdd.com/NTA4MzIxMjdkYzNj/

https://nzxvjej7337bjsdl232nsdlsfa.com/NTA4MzIxMjdkYzNj/

https://2348sdks230df834sd03272nsd.com/NTA4MzIxMjdkYzNj/

rc4.plain

Extracted

Family

octo

C2

https://91.215.85.142/NTA4MzIxMjdkYzNj/

https://edfwn923sfdml237vm90sdl23k.com/NTA4MzIxMjdkYzNj/

https://823jkfs4829nk48kef742kj675.com/NTA4MzIxMjdkYzNj/

https://sdglk33498knsf32667sfknwfr.com/NTA4MzIxMjdkYzNj/

https://952dsjk47kf73ls23k489klfdd.com/NTA4MzIxMjdkYzNj/

https://nzxvjej7337bjsdl232nsdlsfa.com/NTA4MzIxMjdkYzNj/

https://2348sdks230df834sd03272nsd.com/NTA4MzIxMjdkYzNj/

https://hgfghjgf435gghjeerg43567nvz78845rt4.com/NTA4MzIxMjdkYzNj/

https://6tythgfghjgf435g675656nv354yrt54y545.com/NTA4MzIxMjdkYzNj/

https://65regfghjgf4rt345er35gnvt545yrt4345.com/NTA4MzIxMjdkYzNj/

https://634557hgfghjgf43ytjt3585gnvzv54rt5t345.com/NTA4MzIxMjdkYzNj/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.hardhad7
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4232

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.hardhad7/cache/gfisqot

    Filesize

    2.8MB

    MD5

    910713665beb8ff2355ccba86238414e

    SHA1

    4dcdf3e27da080904fa6ed3d3f24453bcd71963c

    SHA256

    561e1593833acdda21ce05b216091af7e156d47007a71ea507c46751d06902f7

    SHA512

    a6428d4502484f9d531a29882c3d00d3775ddb214c02e52fc0a42df09e18a138a0271c368f6a4b4457e29302792016f66baee0252f0ef912dbe0f6214f9e1118

  • /data/data/com.hardhad7/cache/oat/gfisqot.cur.prof

    Filesize

    1KB

    MD5

    a15acd01da7cfd36a34d0842bec3cc82

    SHA1

    a300ad91fec675e186d7750c61b23cc31c921999

    SHA256

    8978681390e05546040f642640f901aebb1d3c3b8ebf4144887d2bd4e51ef38d

    SHA512

    aaf0ce65fa7e9e80a9b5a31d79413972a76489e25e04080f1526630103636192b17b6578a6139c16226abdfd0be177331a5247c67a4dedc2f369789605124260