Analysis
-
max time kernel
148s -
max time network
168s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
24/03/2025, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
7ece55b70494d9476d51f05139b1a60c798d6a28c8e0f05cd6d249c5e63d417f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7ece55b70494d9476d51f05139b1a60c798d6a28c8e0f05cd6d249c5e63d417f.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
7ece55b70494d9476d51f05139b1a60c798d6a28c8e0f05cd6d249c5e63d417f.apk
-
Size
1.8MB
-
MD5
8d30e2e7c51d4915a31e08750e306f63
-
SHA1
1c394a2c6d9395baceebd94feaff6d4177156e79
-
SHA256
7ece55b70494d9476d51f05139b1a60c798d6a28c8e0f05cd6d249c5e63d417f
-
SHA512
0803c927ad5b500f7fd7d65af0c36e98b4437ff1732d6c7ed9e82074000b08b645af0d065d4e54793c7362de01bd117c13c32636064049796f68ac4ca58cb428
-
SSDEEP
49152:itfChUH65gXLPyRyM16gIb6HbY85XGZGZbmq1KZPAE4KoSz:itfCWHSyLPyRyHgIT85XGZQ/1L6
Malware Config
Extracted
octo
https://chroww.top/MmEzNTkzZDFkOWQz/
https://lauytropo.net/MmEzNTkzZDFkOWQz/
https://bobnoopo.org/MmEzNTkzZDFkOWQz/
https://junggvrebvqq.org/MmEzNTkzZDFkOWQz/
https://junggpervbvqqqqqq.com/MmEzNTkzZDFkOWQz/
https://junggvbvqqgroup.com/MmEzNTkzZDFkOWQz/
https://junggvbvqqnetok.com/MmEzNTkzZDFkOWQz/
Extracted
octo
https://chroww.top/MmEzNTkzZDFkOWQz/
https://lauytropo.net/MmEzNTkzZDFkOWQz/
https://bobnoopo.org/MmEzNTkzZDFkOWQz/
https://junggvrebvqq.org/MmEzNTkzZDFkOWQz/
https://junggpervbvqqqqqq.com/MmEzNTkzZDFkOWQz/
https://junggvbvqqgroup.com/MmEzNTkzZDFkOWQz/
https://junggvbvqqnetok.com/MmEzNTkzZDFkOWQz/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bestgetkvg/app_DynamicOptDex/na.json 4760 com.bestgetkvg /data/user/0/com.bestgetkvg/cache/hmsxvlj 4760 com.bestgetkvg /data/user/0/com.bestgetkvg/cache/hmsxvlj 4760 com.bestgetkvg -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bestgetkvg Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bestgetkvg -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.bestgetkvg -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.bestgetkvg -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.bestgetkvg -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bestgetkvg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bestgetkvg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bestgetkvg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bestgetkvg -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.bestgetkvg -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.bestgetkvg -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.bestgetkvg -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.bestgetkvg -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.bestgetkvg -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.bestgetkvg
Processes
-
com.bestgetkvg1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4760
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5faa869fd70c3b1350e99e33226da3a29
SHA151298a19da76a059a2b95d24dc06dbbb3d33b3fa
SHA256ed86fb77817b7a1f8563fe6b28e194741534a766c01fff2d3802b53a065d27e5
SHA51279c5884e1cb9396afa316adbc76902e19666f01736be5ec74b9dc9dd5f12c7c182a051ccd1a0e39fee9250b73563cb23968cadf780441b8d9f86983dfff61abf
-
Filesize
2KB
MD5eac5252de685c45b297dae1be2d39d05
SHA1a6fd60fd91a50ab1cd96589d1ee13bd850505423
SHA256870fb5d6e463807094c92391f294d70ba3712b162c0620018a3fcb823db0f132
SHA51227752e6bf34fcaade6af805d3f2a81140eafc073418b84b38efce782ab20dd06f22be8e5e274d38aa8187769a2cbf7cbc0767bcac1d91658b7a8d2de0b1ca15c
-
Filesize
6KB
MD5d9046b325d19d131c381ba3604444296
SHA162acd85abc113895fb7e73b21394c1e5df5abef1
SHA2568fe655961a0a5606139a83918171f1e0ff8aae47b8544d1cfdc42841879f4cc8
SHA512dc6888f8e6fa5b890fe0f5d693c4d522ba721c0818ffb151b092d34ab7fcb70dddc418916f98568ae1deed533472ce9bcd0af67fbdce7afcf7439d2a035cde4d
-
Filesize
449KB
MD56efd7a5b2e809811e0aa29d2c5a062b1
SHA1bd6f7fdc9d497d1a28284f43d5a46298505494ab
SHA256a92ea5834508e738dcd058969afc6906e009ef42886d9d910b1e6f9ae1ac01f7
SHA512e8d9ab7610e124349c59c9e86f3457dc7d12d394dc1b692ae64ea56bfc2204b22fe8675df8f09098bb870cd7e512d82d1a6da313502d803e140c91eae9e3cf77
-
Filesize
350B
MD55a26cce3beb9e28b2bdbcb93680dbd48
SHA1ef3031ce1ca02516955a510eb979e7f65964b28f
SHA2569366211d0168ac408c0bcfc19cea95a750804194b8b6bb948c4288f1fe192467
SHA5126f6fffd45f01e19e2000066382c6b1befb06c2889b5a17df968d509980f64d1880fd4457031686ebf16be2fafacc3351bf33e333c98ce85071c636b54259ae5f
-
Filesize
480B
MD58864c0e02ad37d767bb13f092ece5e8e
SHA116464d5e8efd8058d3f420906d57c31d4b73f9ea
SHA256582e486c9507c798598b331b47b4cab974759054c0c18442b0062b54f85fd9ec
SHA5124226435aebf03ef87fa4cc5a926dfaa47242a3c1643af3aa2954783129c29a1b8f05e205d2e81f2dfd9c8d25d6c0e4a7ec812a29e6bf5bc2c5dfbae49a0ecae3
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
237B
MD584df141371738cd6b6d65982b462c35c
SHA134fcf8ed9c2df2fdb9f66e0576b33e69f08d7526
SHA256649e1051c42e85a7fe6166935a62d2d7602b6482ce1dd34a9d330e2711c5ddd8
SHA512a8b7f7c285180cc3ed377785ca55bc4ac7dfc4d61977e08258460137f276d0ce44c7815b140f9fe80113403d010005c5ae410dd1124d49f7741b04bb5fe8d925
-
Filesize
64B
MD54feb48878a926e025eaec77ec314eac9
SHA1960644e4e266e3f0b81abfae37ba19cba6f80948
SHA256a62964c2a60a769bc2217e9da4abe667acb6629d31c40f6fb2de77a2d56383a1
SHA5128087a957ea04111f0135a14a7161e82d104ab8309a1921d2bbeb47333aa23c468f0dd8da036977cdad3ef66737c5cb7f4e5a3f994b0cb1d6dc14095d9c24347d
-
Filesize
54B
MD51d2300fb0bd1b975cd7f1ac5bd5c5cda
SHA1aa5a3c0e7b33754984e075e9d549caed56a084ed
SHA2565e31366032006b990b5b32a9c39f238099a99176f441c7de0885d12a12239ff4
SHA51289e17af98df17c10d00f7342a5f3a828bd17b3b7180808edfb72ebd332c00a1c46e63df9a1fb4f5bf15452b58ef7972a296c22c0cf5b48bb8e22bf7540409ec6