Analysis

  • max time kernel
    171s
  • max time network
    139s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    16-07-2024 22:05

General

  • Target

    f9e17c77f61b5f248620f9b5e29a1d4ef72e963cf677abc84c0f76649460062b.apk

  • Size

    509KB

  • MD5

    7609aa15f0bc0ebc264e89edb68c4dcc

  • SHA1

    59aeb3876ffd4905753bfcedf9be6fd86d92eaf3

  • SHA256

    f9e17c77f61b5f248620f9b5e29a1d4ef72e963cf677abc84c0f76649460062b

  • SHA512

    6b4e298a58e695434d7e078d5be0eda2e32379686f67987110356f70cf27a6355594f8fe2488bcbd25115e1e8e557fd3d74707236c082a6c1961358ed23cf384

  • SSDEEP

    12288:z8xkn6XQGbagnKc7eRhypax5g34DWoI0tg4FOOZY:z8xknovKseRYpaI3Lo3C4FOAY

Malware Config

Extracted

Family

octo

C2

https://mutocosturoyur.com/YmJhM2M5ZjYyODY5/

https://lolo2naberlo.com/YmJhM2M5ZjYyODY5/

https://havalarsicaktir.com/YmJhM2M5ZjYyODY5/

https://calısmıske34r.com/YmJhM2M5ZjYyODY5/

https://r4s5t2t2fa.com/YmJhM2M5ZjYyODY5/

https://gurcustill254.com/YmJhM2M5ZjYyODY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.warmoften35
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.warmoften35/.qcom.warmoften35
    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.warmoften35/cache/ntcxahfdrjya
    Filesize

    448KB

    MD5

    77431e7769c4c11e4523c0ac2982d3fb

    SHA1

    a4c69daf67ac821d11ab664015e499cad49e1a29

    SHA256

    fc8c9365709b96defd6ca3ac445351101d4547766fd757cfefad64922185cdff

    SHA512

    414a30f909838a882195a5d950c6ebf4503ebd65ca4942dc6eba882cfb965bb7b8f9a0552d9a749e0a5a8ea54fb9a52507ee7e939127c2b1cced7b69e769430e

  • /data/data/com.warmoften35/cache/oat/ntcxahfdrjya.cur.prof
    Filesize

    471B

    MD5

    63a2fc015f0bf003b232ec4168d423e7

    SHA1

    cf8b36328eb7618bbf12f7415ed63e29e1883ea6

    SHA256

    845ea0c4f4187d686205d825e7b5a7fdea0cb8d3aa6d4a9175729cc4b9655d2e

    SHA512

    77ed630c52e428750a7f36ce8a43b7e2bc9915a062d7eb8e012193a2b5e62b234edf7c97c55bf84a0f677809e744f07567d3ff99dfea1140a4313f0ee3fa9472

  • /data/data/com.warmoften35/kl.txt
    Filesize

    237B

    MD5

    45c10562434cc1f29d498b66ea35a926

    SHA1

    a4f0b2e55c1774886d56f3173e89f8ac8ddff70b

    SHA256

    0c3dbec4ce22ce581077ab9425082443ca2fa95f3c3ecdd8aa852a4a9725c1de

    SHA512

    a812b0058c8778df5854df00c73db5a44d844611359789dac09eb0004f5b490cc3c18e5a120d40d189ddb6b186fa7278e0e309a0a29d369a7c1255f501461910

  • /data/data/com.warmoften35/kl.txt
    Filesize

    54B

    MD5

    44063b0d335f145d7bf67000a99b258f

    SHA1

    8de1ea843206191512690851674ef4f84691409f

    SHA256

    6b0a3f79e31aa16c4d0f9764bf70cde48b98b6e03e2b78d141a7b6b6a7433385

    SHA512

    44a6cc2dbb668151fef5bdb814a3bcd8e4fef62dec3867e18416270b3b05c55c0816297ed4302b60cd4a3ceb36935aa0bbeb814d0b797a8a5197cac4fcc27d2d

  • /data/data/com.warmoften35/kl.txt
    Filesize

    68B

    MD5

    9b85b11c74cf8e58a60a3616cc4845cb

    SHA1

    345f2ea06c601b8b2b0273244ddbc941c90617c4

    SHA256

    d31b05ba0d5464b3b3d5ea72182775dc7233187f8f37709047ea37a34e3f4b63

    SHA512

    90ab62fb278d98c7da424363038158d6c6fa10258d9f12abb79794695f686c2023b1f6dfe60e869cbe46432243e8976c8257446053f30be3a151febd724cb6fa

  • /data/data/com.warmoften35/kl.txt
    Filesize

    63B

    MD5

    5ff08f72452c1c348cf505e5134acdf5

    SHA1

    a959b1584c72cc8e71885c65367f37dec80e546d

    SHA256

    c4ee5573b3eaec8adb6322941e5a068656e476b25180b3cc0fbe1f939e187014

    SHA512

    054f526278c6d6330ed8b185fa5081b9b91cc0435d210efe1eaf13743766899e2a59b6b6fc35fb803ba6b449851579773fd6c4bf08c95979b002cc5715ab1022

  • /data/data/com.warmoften35/kl.txt
    Filesize

    437B

    MD5

    63813e3ad0799543b8bcba9f71198e19

    SHA1

    c50d9d1ccb8508140957f7a16a1724176a936e8d

    SHA256

    b2f3eb4f1597d53f64bd9b281f95821d026397434c8a693e5dfdf9b3e83a138d

    SHA512

    4150531d629c730f9df114501e05651d232238323c15569ec1c101d16c44a7b0a88ebf568e90bc5b356e7420126ee14acb01a3b2fd2be8ed46bb6163bd83b062