Analysis
-
max time kernel
149s -
max time network
158s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
21/03/2025, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
1aae1e81737161f4db26824a61d8570b775dc882b4d30ecf428452810b63853f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
1aae1e81737161f4db26824a61d8570b775dc882b4d30ecf428452810b63853f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
1aae1e81737161f4db26824a61d8570b775dc882b4d30ecf428452810b63853f.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
base.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
base.apk
-
Size
1.6MB
-
MD5
871ad2475ababea9dc67fa3396662753
-
SHA1
65702d5bc3e5f6e342a46102f780f7f12eb023e7
-
SHA256
2ab2c7af22028d3e7bd62de16d787f1b6718d1cf49955cba0844d9280b15ae2d
-
SHA512
5c2880e153077751db5156cdb8088c2e236aacd1a7ae19b43cfd2983581d76af8edc87c1878f52de6ed48d6681c97b6561947917732d021ff6d0cb36fd9deb38
-
SSDEEP
24576:U4LQL0ewuycOF0fMTYFxxnJg7viCZFPrQbbpEPLVnbhKYSlX/p4dQMqSoxtRQAxh:RRhYF5g7viShrMSjRhKYRdQMqSoHXz
Malware Config
Extracted
octo
https://emonifados.quest/YWFiM2VkMmFmNWFh/
https://emonifados000.net/YWFiM2VkMmFmNWFh/
Extracted
octo
https://emonifados.quest/YWFiM2VkMmFmNWFh/
https://emonifados000.net/YWFiM2VkMmFmNWFh/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral4/files/fstream-6.dat family_octo -
pid Process 4211 com.morewouldyk -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.morewouldyk/app_DynamicOptDex/iKxZiyk.json 4238 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.morewouldyk/app_DynamicOptDex/iKxZiyk.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.morewouldyk/app_DynamicOptDex/oat/x86/iKxZiyk.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.morewouldyk/app_DynamicOptDex/iKxZiyk.json 4211 com.morewouldyk /data/user/0/com.morewouldyk/cache/esimuzfui 4211 com.morewouldyk /data/user/0/com.morewouldyk/cache/esimuzfui 4211 com.morewouldyk -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.morewouldyk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.morewouldyk -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.morewouldyk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.morewouldyk -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.morewouldyk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.morewouldyk -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.morewouldyk -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.morewouldyk -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.morewouldyk -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.morewouldyk -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.morewouldyk -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.morewouldyk
Processes
-
com.morewouldyk1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4211 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.morewouldyk/app_DynamicOptDex/iKxZiyk.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.morewouldyk/app_DynamicOptDex/oat/x86/iKxZiyk.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4238
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58315b013bb2d1857c89581519ae372af
SHA13bba2882abe325bc6692d10a22e1080349aa88f4
SHA2566171939881cac7e87612b72974fe9d8d33c4ee7d8e9a1c9719f8a92fbce91fc8
SHA512c519ae909ef6a9b604250804e15243902b1951a28564568435670089a02361746682b6aaf69f42b13571a84ec155b771fa2601c9b153e925c1e73075360978e6
-
Filesize
1KB
MD58eca4b52bc7e3f5c7a737ec7fffd29cb
SHA198513cae27b04562101cbdfd7479cdab5630e3e7
SHA2566b15970cae8db20c37647df6e93fd62384701676b31bb5e55d5078b6a50c525f
SHA51202fc8ed55dab3a28cb7bc34b1812f30c165d37cde1f775cdd45fbaa481778520225702c6f603954a8f73a8ff13caf4a32fc5b7de8557405d0b99f37157bef8a2
-
Filesize
448KB
MD5f7e557fe086242872e8fc5915dce08d5
SHA17b72bcb8eadc2f90373c3e8b411e993a9b68fa9c
SHA2566ea1092caff8c9893d7bd54527bc4416bb9177ac85ae7f9acd3cc5c20b54ec5c
SHA5128ad1cad799d43dac083d4fce2b5644782c3113f2a1dd616a1d38c2097f1bf4946c2cfbc5e11dc2084df0bb2b0a4bd4c6e1079edfdffb1648bb17df7940fa2de0
-
Filesize
446B
MD5be2c3f52e1eb275734396ea78480cbec
SHA13ec310c49ff0f04c674c3d434920c9322a20ac76
SHA256faafe05d12f8c594e1844d8f1ec92e396a7aaeb82118921d49c1c1e72352bcb8
SHA5126b8435bfbad254794c5d5184555668bb9fa4ed99e472f89f1be9e05e138d130c2bf7af36f0afabdd9782ce28999402fe287924ec42e488d1826e4823b97c31f2
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD519fb413647ca8aeea578a322bb898e34
SHA10ddae7a3ab06ca66013fd80e920dfb9c513af8bc
SHA2560c62d20385b11929399e333743753c4f812eadd87e771a391ec9bdeab912923e
SHA5120810ba5f4594c02d42318111e37adac1a5fd893d0aa9d15c9d47533011d8b74baa7ec234630841a8d53d180b1df75b55940040dfef1d9d662e5117b92faffa55
-
Filesize
54B
MD540600da7c10b2b86a2c00d1cadf7da52
SHA12cabc11973a3d4a02e052a089faa19b528e86f25
SHA256c7f6b04ab4b94c00374ad8db8bd87a456d84036a0024385f4b765cdc6913ca19
SHA512551f7fede8e01b93439527d9b3ba89e8e6fe4695e61dccc3729e57017bf7d7490e3550f63389ad6e60d212ba95a7bf2f963f1c047afca65e0bf28a3b380933a2
-
Filesize
63B
MD540aa7d5650411e21ce3bcb68d4643967
SHA153b38cea0c8da0816ee0b0f7bd112a5fab35b07d
SHA256b58879331cb474d33d03bb78ed58ec58e65484a329b77905905ef652a704e233
SHA512ed764a7ac3c2429d08b4f73c5d98dc4a67b6a0f327767d2201e7d68b4576d6e31a14fcc8d15ec752fc004d6081d150d54162bc29282c1ef9c0e366a384820c13
-
Filesize
437B
MD50a21616eb439b34f17cdd8b8b822b957
SHA1f0af9c7d4cc647d77762197cbfec993d7d89a3c1
SHA25652f1b995e63c112516dd9a2e9c3aed03b418ffdbcd3441659be18026f28ffe81
SHA51246dfabf691f5c984f883bc8c24a1e9df27fe7e31035300c0198f182bdddeb4d2ae289108e5a60c0d8488d287750432e28f461f651688c765a06f64e3f58735d9
-
Filesize
2KB
MD5487609d4fede3a87feb3429b23e4ce47
SHA1770dc382d88d609718810640a4706355d8939382
SHA2569565c673239b891bad2217cfa049acb33a4d603b2cf7b6dc83a1c0033b687f83
SHA5122c3e4a3fca1ebb57403fb30b7a7f9c6e3a7020e6fbc7bdcf16c661f4adf621429334449c4ccd3ba11ea87d208719344d5a274d792d090efd525ab5e5442a7b76
-
Filesize
2KB
MD5a4a876d786f88020b099d40a084ff860
SHA1d6ce42b1d4666ecee698ed2e2e2cfd748f4a76e2
SHA256e711d7900e1d40d1f0d8a454f62788f43d21a294645cf6081ac94dad653ed8b6
SHA512079dc738c276d11640923e4c5d5ea78483d7b8339e740d0510da7a8266bb6457589e64bc0d90d13f9a869a80c0672dcc054c6a352e7ea930a27480311dd1e81f