Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
14/04/2025, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
55db758f644c40295e6ad4346fa75ed668ce566c4365d04aa0a068d55f034c36.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
55db758f644c40295e6ad4346fa75ed668ce566c4365d04aa0a068d55f034c36.apk
Resource
android-x64-20240910-en
General
-
Target
55db758f644c40295e6ad4346fa75ed668ce566c4365d04aa0a068d55f034c36.apk
-
Size
4.0MB
-
MD5
f1b69530c612771512a2f671efdef2f7
-
SHA1
87a44c66273296239fe20ff9356a46aa61fefae1
-
SHA256
55db758f644c40295e6ad4346fa75ed668ce566c4365d04aa0a068d55f034c36
-
SHA512
9a194450ad4a30da45042b50a8fbaf261a3cb5fcf789d99e3d7a29eea761911e3a6fd3e9f6b131e4efb10954e6221572be6b3e482e94a3c5e5042b79a6f87097
-
SSDEEP
98304:/gBJdP+4BnL3mvkZ2peeYnM6K9RF++4JgthajcM0iJUnT:IxPZp6vBeecMd++IOz
Malware Config
Extracted
octo
https://zoecozum.com/ZGZlZTNiYThiMjcx/
https://adilemutlubirhayat2.com/ZGZlZTNiYThiMjcx/
https://naber25naber.com/ZGZlZTNiYThiMjcx/
https://kelimecozm2u.com/ZGZlZTNiYThiMjcx/
https://naberk1rvee34.com/ZGZlZTNiYThiMjcx/
Extracted
octo
https://zoecozum.com/ZGZlZTNiYThiMjcx/
https://adilemutlubirhayat2.com/ZGZlZTNiYThiMjcx/
https://naber25naber.com/ZGZlZTNiYThiMjcx/
https://kelimecozm2u.com/ZGZlZTNiYThiMjcx/
https://naberk1rvee34.com/ZGZlZTNiYThiMjcx/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral1/files/fstream-6.dat family_octo -
pid Process 4212 com.completenew9 -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.completenew9/app_two/scgF.json 4237 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.completenew9/app_two/scgF.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.completenew9/app_two/oat/x86/scgF.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.completenew9/app_two/scgF.json 4212 com.completenew9 /data/user/0/com.completenew9/cache/bfrkeuqn 4212 com.completenew9 /data/user/0/com.completenew9/cache/bfrkeuqn 4212 com.completenew9 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.completenew9 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.completenew9 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.completenew9 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.completenew9 -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.completenew9 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.completenew9 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.completenew9 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.completenew9 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.completenew9 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.completenew9 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.completenew9 -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.completenew9 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.completenew9 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.completenew9
Processes
-
com.completenew91⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4212 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.completenew9/app_two/scgF.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.completenew9/app_two/oat/x86/scgF.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4237
-
Network
MITRE ATT&CK Mobile v16
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD58a6234489d029af8b08320aef57621a8
SHA1920b575023405230d034f6f6256f88189cfa5190
SHA2562752ff87cd7c12265d0a7b373fb719c0b2b223d78309733cf9bf734b2601489c
SHA512acbc7642cbde88bb9928dded4c34a9514fed70da4f214440b1be609ff4d007aed723119255b6931392c5a88b793d5d2b300efc85f4b9937a1f9804be7bdf12e4
-
Filesize
1.0MB
MD50f66c7050594edc7eed83d7c36893f90
SHA16333c335c811364fb39163896b4f8a616a758dfa
SHA256979563741d1b34149ca53cd6edaf1e49c18f653f166bd2f951aeed7d4b80b1ec
SHA5127d189efe4fb80e3f0eb1397013d572666a5857a902e17fc39a5baf69bf81817ba5f6f6b479ef152e9022c9fb41829e6ee5dca3dc8dd10567857482135d85770e
-
Filesize
976KB
MD5ce825e821df06b681c0e424e0bebcf20
SHA105ad66e6d27035cbb7b9ab0df02c74abe75856bc
SHA256948200f2549e6effc98c998e9258431660b4c6c0ec1a14ab44dd4a0c4d587da7
SHA512c2310fb851815405aff5b615d878d5e8225a1ef9cb95b13a2cfb308c1be9cd603ad28cf8f557cce125b99bd0c3967d13df40d2eaf5029f2df1c076bc5d6d076f
-
Filesize
497B
MD5806629d20b3a57edba1c73a247e198e7
SHA1938b28f941f0d6dcb83ee41f552f6b8d1d1e37ce
SHA256db25a1507aca1aaf6bf1c5185bbbbdd557bb7c70076dff2624e36d15f5d008fd
SHA51275e7b3715910ba359e8fce81a3cdd7ccc143fee82bed138f7f1212081ca1f863a29ee931797de8be670c201de1f7c8d4f920a5c6f1708b427950ec0ed60fc595
-
Filesize
3.0MB
MD51d41cd7e3b289f6dbeef5876493d4ece
SHA1aefcafb36c2536ce1a5fea6436b6380e06832fd0
SHA256feac28d6149db9aa31ffbaaa93d837855490f5c1e34c9a133553847fb35455c1
SHA512aab6d817983c63b070f8cd9a26977edad44e4bc89c2600f66612e7e3b1c7b490b1275f84c770aa3f926e3c68571a98aaf05bf086f27087dc91c035fe69edb25c
-
Filesize
3.0MB
MD51d43548599e365587a8bffc117df52f5
SHA108b5ae088481bee8f92b4ef7557d2472a8255c5f
SHA2562c6e5a0b672da88cfc790546fa59c8c865cc5764cef422f23e6d8c228115817e
SHA5120d8d65d724aa72ff9617f5b1d3b66434b7a905ba649ed5ab984681c7387c1c790643c414d9c81db9d72432259f90a663a4509be6cafd4037fbbe1f71a26e1444