Analysis
-
max time kernel
150s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
22/03/2025, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
4961670c629f6bae3f820572cd00fed6199d9342c509e5eeaa36e26b8ada1421.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4961670c629f6bae3f820572cd00fed6199d9342c509e5eeaa36e26b8ada1421.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
4961670c629f6bae3f820572cd00fed6199d9342c509e5eeaa36e26b8ada1421.apk
-
Size
3.2MB
-
MD5
9331e8cb5d5a282fc173e2e917262dbf
-
SHA1
8e76e8ad5c5e6fae60bc54a56ac1e32ad8b72b18
-
SHA256
4961670c629f6bae3f820572cd00fed6199d9342c509e5eeaa36e26b8ada1421
-
SHA512
11e0de040f33799a3e97418598b32a67bd20189ea9ac1b01e2d1bd6792bb4d5f0c341ad30597e67672df6ec8c8ed2b25f081f138b9534379839edd4ac8b8d57f
-
SSDEEP
98304:A4jyBT/BShXIT8WCych5DTiNMBU/zDRJNGKFn:byBT/cXU8acyNf/zDRyKN
Malware Config
Extracted
octo
https://185.196.9.197/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass2.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass3.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass4.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass5.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass6.net/MTQ4MmUxODBhMTVi/
Extracted
octo
https://185.196.9.197/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass2.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass3.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass4.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass5.net/MTQ4MmUxODBhMTVi/
https://xxxpakunatationclass6.net/MTQ4MmUxODBhMTVi/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-2.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.studybut8/app_ded/2Qv11thM6S1fPKxVbQpvN1HROpKiy5O4.dex 4778 com.studybut8 /data/user/0/com.studybut8/app_ded/2Qv11thM6S1fPKxVbQpvN1HROpKiy5O4.dex 4778 com.studybut8 /data/user/0/com.studybut8/cache/qmjaqyixgeuxsyy 4778 com.studybut8 /data/user/0/com.studybut8/cache/qmjaqyixgeuxsyy 4778 com.studybut8 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.studybut8 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.studybut8 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.studybut8 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.studybut8 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.studybut8 -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.studybut8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.studybut8 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.studybut8 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.studybut8 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.studybut8 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.studybut8 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.studybut8 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.studybut8 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.studybut8
Processes
-
com.studybut81⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4778
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f5cffe3307b1ed7e6c7d563117f97684
SHA13b4fef0a524d1e29bfe6c1ca3fd57feee566fc9b
SHA2563309e981bc83f443e2b156dcaab1b6277399b03793eec1c062092eca83e92f2d
SHA5128f48467b62abb8d99428fecf8b99f7b4d075a2831c36e790769186dcda5c480c4d9a52db5b2ea77de25b114bc6e515fe876898587e8cdd2589c636871fb343a7
-
Filesize
335B
MD59b6f397b7ac4ef34869f9ce3884adfbc
SHA1d2524937d8253a04f259e8f067f069b337137043
SHA2567c1c8b6298fa637a24634939ab97def31696975fcba1245e506e70842056cd47
SHA51251c70b2e4c192e32ed4e03f63536d560cd3a514f2cfcc60c264a930603a5c75bd20c773208495bb1e3cce5588e291a46efc0df8ec6340d12258fed94c1659406
-
Filesize
449KB
MD5101eee30f6075f0d785255d80a1865b6
SHA19814bccdf5b2545e571ba27fa4a32caab506d072
SHA256285dfa67f866f80ed32e0cecdcb2aa1ad4506025dda179164feadf59ce564cf9
SHA512e807d83b7796b5d30a3760fcb3fbd276e97547d40083cecedf0c08e3b03299879e79ff247988675d2ac2d11aa8d7ed7daba0bd5c5180a60f27998d7fa76c5664
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
230B
MD597b3d5193b34bde5835e93468763faac
SHA1f62d179f7124cafa592725e0b8921467895f9a97
SHA256ad275fb4980cb630e6e09578f3ccb8eac9efeab22c7ea96f75e5b0e0e42a038d
SHA51230c0e7ea1cd27f72bb068754126c4c1105c63b883b32bf6e85f5946060e4ce47e19d4edbfa9bbec3421c474b5724411f95cb645619f2933074fb77817d01a13f
-
Filesize
63B
MD53154a7661f661ad7c1a3d2ed5e9af5a1
SHA1acc70cd34338389ee0281764bd471278d67f2b48
SHA25696e696a5407607c512735f6a50d5ee503979646d8140f76664ea2f9be1fbe7a5
SHA512cc0160e7715893031923e0b9d007b3a627ac3398b8c7f52d4518e7573005f32815785ff601e09fc3e324843a7e5a33a494cb90b553fe2d73f0c127cd5ff376ac
-
Filesize
45B
MD5062e9c5ea6662657deeacf144ddf61ee
SHA1cc9ea6ae83fac5d3b1a59d54fd29db8a82924798
SHA2561f07d6cc077f52c6ff42542ac725616ebd17bc5f429092120cd03f7a5aa7ecf5
SHA5128196601d28b3bad94d5aa531505525ad13920acd61481fb82f58d128f4a8d60a9028950085e04b56ff8de2c70b322a678a372cd0cb2fe0ff676c92ea7e7b643e
-
Filesize
466B
MD50ffa902d4d60e5ebddf83b9f4e2d6f81
SHA1deb5a5598881455a7e9c72cf9b903d39c7f1ef17
SHA256856585b34486d9149c800dc91464982c69d883f1b6fceb4567bf1b8ef7d53781
SHA5124dc5f4fe898fbe68a06c030e694b1e25f6b5f70f68c5bb438ba183449cc4aad65bcec7659cfe4801ab392ab7f796b0d14e7895eec576d681a7fd834f99691daf