Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
24/03/2025, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
6ad5771e032b66caabcf3b531a0647444849d9afa1708767bc178b2af9db432b.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
6ad5771e032b66caabcf3b531a0647444849d9afa1708767bc178b2af9db432b.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
6ad5771e032b66caabcf3b531a0647444849d9afa1708767bc178b2af9db432b.apk
-
Size
2.0MB
-
MD5
3e658b4807e17153d6a879a7061f2aa0
-
SHA1
2e3ac0a39f8ff81edc341545987b017ded6adb14
-
SHA256
6ad5771e032b66caabcf3b531a0647444849d9afa1708767bc178b2af9db432b
-
SHA512
952319493125299f933dfa9f541a91bfa6ceabcc91b34f6ab8d796f1cecac9c0640d7e8d782a9bcf3073b268fae3455a9bb2e9066bf1e44c4188e2660ab3960d
-
SSDEEP
49152:Zulrw1TcY65kYz7eg4CX5R8dcSPmRSCtfl3HML6u:glGcY65kYzKfCX5R8dcWmgGfl8Z
Malware Config
Extracted
octo
https://r85d4kbe5729.vip/MTU2OWE0NzJjNGY5/
https://4ht227ce29z6.xyz/MTU2OWE0NzJjNGY5/
https://6kd020yb568x.top/MTU2OWE0NzJjNGY5/
https://f2kic1nam25n81k.cc/MTU2OWE0NzJjNGY5/
https://99ol9f44xvgo.cn/MTU2OWE0NzJjNGY5/
Extracted
octo
https://r85d4kbe5729.vip/MTU2OWE0NzJjNGY5/
https://4ht227ce29z6.xyz/MTU2OWE0NzJjNGY5/
https://6kd020yb568x.top/MTU2OWE0NzJjNGY5/
https://f2kic1nam25n81k.cc/MTU2OWE0NzJjNGY5/
https://99ol9f44xvgo.cn/MTU2OWE0NzJjNGY5/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.uptown36/app_DynamicOptDex/rHR.json 4770 com.uptown36 /data/user/0/com.uptown36/cache/wuiycb 4770 com.uptown36 /data/user/0/com.uptown36/cache/wuiycb 4770 com.uptown36 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.uptown36 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.uptown36 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.uptown36 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.uptown36 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.uptown36 -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uptown36 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uptown36 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uptown36 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.uptown36 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.uptown36 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.uptown36 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.uptown36 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.uptown36 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.uptown36
Processes
-
com.uptown361⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4770
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a98c27f2d802de482c933cbb6e204511
SHA1a201d826d0199f0087b92bce7c46432ae4e72b35
SHA256405d2d57653aa13caf819dd44941f3850be28ccb944d887b0dd0a583bb700eb3
SHA5122f83b1e40ecc0243e7038fb007823b177de78e9b04d6e42a873d0f00d9e8487152fb707f70508638a897604e12a85e9dd1e4f33b21ca132dd6378deaf60964a3
-
Filesize
2KB
MD54cca8f4b2ecfa0a565a4eaea702b8c94
SHA19f0374e5e03a07100d8bb7a496aebe4a3187c465
SHA2567e0949215c4d1afd910c87c5fdf4c19853cd9ee7b77d3ef7b88d44c6063bf273
SHA512bc3caf0796937585f3933e4df4f8667151ab348a0607bdbdab29a790b6bc90f9aa3ad3a12110a31c27a0344fd78612c06e3430b4542b4e8704d3c6d6caad714b
-
Filesize
6KB
MD5a2d1b6aa6d7193b53079ee7b798804ad
SHA14dd211a992e9d8533037a294f4186285e4487bf2
SHA25669824958a87c263dd8d55cb2e84484645f1847f21281bec94bbebf9db5b6881c
SHA51234da070f3c26c07a2d64d390a16647bb3e6b688ca5247bd389eff90ddc8c6513cdcf594b4c654364aa2711b0b979eefb0b6045f14f8f0505d6d6b8529dc6fc85
-
Filesize
338B
MD5b206451c9aa240e41fec54dd3726a736
SHA1271672a8fac7897bb401e874e61179a8c6a11824
SHA2569c988e124fe83d9d78395bc1969d5175d708e68e89de127c34ffcf4058d09f51
SHA512dcb9a7149eb7b832360b23ec63a7709f1c3bdae5e61049db8e1c837d13cea4d6976565c3c3cdde4b893706bad1b10aba8013e05d729b84179f3cb9e14a1102fb
-
Filesize
457KB
MD5ef22b1abb17fce6ff977331eece0b43d
SHA1220e1337e83cd74286a25ac9f75808010d773517
SHA25632ca51c54c11a4bf0e9ed240048bdfe6a1851b83d93eeea3ec84a6d98b01ad0d
SHA512d6e327d2c3290f21d1fd9c693835e3f27d1029a5de37c225bb2d666af1da5cbb55f2887e4393bb2c903ce42afcb8f77fc11ca1a43a8bc66db26989d9dae853b9
-
Filesize
484B
MD58d7d13e3c40d064fd4b44e60e2fba3ef
SHA1ff9214adc488c8e3730b882f5579ae48c9799dbf
SHA256e70e567944ffb0ffd4c43165e8b8b9358bf00adea6bf754ea23b82fa1c17d305
SHA51250540d4fdd16afc6894f8262c0943514971a3f28bf9d78ed9fbaeff8822cd1714af68b3b496daa4d85a309e14cde551b75f02a47aa837a0c0945c760e1ae3474
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
239B
MD5bbb7f868b96a419f6cb857509b2da9e0
SHA1426469bcd50956d7810fa51d145f3d86dac5b228
SHA2566a2f8b00d25cbd0c4b764ef2cff2512a2dc91e9f035028b1bd5217e6c394ee1e
SHA51242261ff53d1a892c5f77b58c13da209e2199fe61961a60f366b73b8576615b17a863b0c8635a5726b319b57ba1fdab19cc2bb512fd62e4e93ed2b38dbb4f6469
-
Filesize
45B
MD523378a66c14947555092f00b26673fd6
SHA10853475708d82293a8e62414fe01d2fb5fe6d0c9
SHA2564027fadd7452b4a9c4415af1aa97648c14fe9a1c10ef1e587b6cf3812ecb5a78
SHA5120215a54a15cec05ef4758ced71c8bc06a10af704c17389989476ae740460e8c3c9a99463ed523a2a108b46801ba47a30da0f151b71702222a33f3b426fe9858e
-
Filesize
63B
MD5ccb4207eeb26926bcdea81b3e0addd65
SHA18dcdcabffc8bb01d6b4a444180c96d327b999fe2
SHA25686841e8d1621694e27552701bd58e89f27224198515839b92300177ecd25663a
SHA51295d6941cd071fa47b582d412e64d49ea03e4414549ef5cb0d3a4a4651cbaecdcc4e5723efb231fd1981bd2258f809fbd72676c6ffc77f3df3a1579c07cf7e14e