Analysis

  • max time kernel
    33s
  • max time network
    134s
  • platform
    android_x86
  • resource
    android-x86-arm-20231215-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system
  • submitted
    17-02-2024 22:01

General

  • Target

    6b950d1779fbffd655050c571c2596c1acb80952a91cb2d7b523ccef458bd1b7.apk

  • Size

    541KB

  • MD5

    34a908ef17a8ce8c180d84658f6f297a

  • SHA1

    d52ade267cb8341854c9c5a14935066ca5d9b773

  • SHA256

    6b950d1779fbffd655050c571c2596c1acb80952a91cb2d7b523ccef458bd1b7

  • SHA512

    0751df7110f5ab9956604ae4585fa7fe14064a07851826846f43f1fab2a199211681596c6e3ca3473d553f1c281d669158eae785fd46a2d9d7e12790bcdfe11b

  • SSDEEP

    12288:qrf8KzGAnwku7n0s1YAIHKdYdDnNvvnpZE4XVVUFksTO23m2Xnb:qrf8MG9kzQvKVJp+eUFksK23m4nb

Malware Config

Extracted

Family

octo

C2

https://91.240.118.224/NjQyNDcyMjE3ZWU3/

https://asamanaproductioneditionksla.net/NjQyNDcyMjE3ZWU3/

https://asamanaproductioneditionalsk.com/NjQyNDcyMjE3ZWU3/

https://asamanaproductioneditionpskl.net/NjQyNDcyMjE3ZWU3/

https://asamanaproductioneditionctfm.com/NjQyNDcyMjE3ZWU3/

https://asamanaproductioneditiontsma.net/NjQyNDcyMjE3ZWU3/

https://asamanaproductioneditiontols.com/NjQyNDcyMjE3ZWU3/

https://asamanaproductioneditionkdna.net/NjQyNDcyMjE3ZWU3/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Makes use of the framework's Accessibility service 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Acquires the wake lock 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.maplongajn
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4263

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.maplongajn/cache/yjsehqzkzntnwj

    Filesize

    450KB

    MD5

    934c33ef42c5f20bd293868f36286ebb

    SHA1

    46deb41a65bdd6cec06cd08d26514020873829ba

    SHA256

    df8687201d23318937b16f804df3837751a86bd77fd4d61596bf6ef46dce4350

    SHA512

    3f2bb85d62e5c17f0b439faaf7e19d9c76022181a7ab27a6ff057bcd8cef812e4690b4003f61a9295b7aa6532f48d620081a51f824e307227eb37fa78e546ea9

  • /data/data/com.maplongajn/kl.txt

    Filesize

    230B

    MD5

    028eae857678c63753bc0acd08e92f68

    SHA1

    bb00a108a043535c8e68d1ca83f6769d92bedff9

    SHA256

    a58c277375188661db6e1c59532762ead6af720deee0ff212b9e6b410964e22b

    SHA512

    6c868de7c5301b51509d45f89f7149a75a010ecad8791deb6642b42361f02f43f9b976e349ab0af08103f0c5f2eae1f5d8721222d8dff6034232813a89b32d26

  • /data/data/com.maplongajn/kl.txt

    Filesize

    54B

    MD5

    bdb4d6f959017dd72d213908f90bcc68

    SHA1

    397d1de3acfd34a603bf701047ca9d6e58a79843

    SHA256

    0a3d7b6549fc12fe6916e73fd94984c16ccc967d30307168eed84e5079289ec2

    SHA512

    3a0c135e53d676d8b9cf39a68124a8096d14b34023d956533d3692ccb4c8328414be16c2e3fcefeebab8d7865fc5f25cbfb72fb15201f9f2efe7a838a93519b6

  • /data/data/com.maplongajn/kl.txt

    Filesize

    63B

    MD5

    f38f0233e0f96467514919b9327aec77

    SHA1

    e9143dbb3e4a036946506c1aaa044a1d32edb55e

    SHA256

    67e4687154537f2dec3b35b1d4f09f7d03443cfce9ac43b5022833fc3d879d7c

    SHA512

    897deb7551d3576309676d94063c410657345000ad14d3c125f9b7c65fa4396a67dd51a73377b3d0cfb62b5b1122efbd3440cb7feb4e602ec4f742cb1ed9527d

  • /data/data/com.maplongajn/kl.txt

    Filesize

    79B

    MD5

    15fbc2dbadf4fdd7e40ab0f273707dd9

    SHA1

    a8903dc0cb7a0e73e22effbd3aea93d8fea19f3b

    SHA256

    a636a87567e70810c88cea33e9e5873e6b275e626a85f945bd1c2f817b121d4b

    SHA512

    154ff0133b41667a0e8df3881f2ee79d71c0a0a7a7ef9be627f2de9456163ad041a22dd2145c0caf86baf4198e809ab717a600c234d5c5726cdd1edb6b787ef7

  • /data/data/com.maplongajn/kl.txt

    Filesize

    144B

    MD5

    c9ce8ede76f4c1fdf598eda3fd76d317

    SHA1

    e84c1c6485d933f3dc31d72143c4d6865dc31cf8

    SHA256

    aa02d3b9890af71a859eaa7a07df178fe09943da702864266284e0f313b91984

    SHA512

    3df5e229250b1afd55199514d60c17ca66f7f11f9693723dad7eea4be0791d166a08a7c51d5ae5382f3179f4470a418f09e3a8c915b210c06d47cf7935b86d98