Analysis

  • max time kernel
    178s
  • max time network
    147s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    24-07-2024 03:08

General

  • Target

    ca3da13d69ce07ed9b31314f2404f9c6a2235067406b545d7b00517258cee9d6.apk

  • Size

    509KB

  • MD5

    97e1e1b53f1797dd648aa8cc40b57d2b

  • SHA1

    332d36caeb01f594c739cdaeb5c5fe4c648b7a40

  • SHA256

    ca3da13d69ce07ed9b31314f2404f9c6a2235067406b545d7b00517258cee9d6

  • SHA512

    77fac48dea6dd80d80fbfef86994f8762737e86dc8ce0fd6c1f95380638f1a660520f5e33abcf61366cfe56b6e0da6901a677fc0a9c5af8413dff0d36c48dcc8

  • SSDEEP

    12288:LPhrWdn73GDTgpZzrT1UBUonEi2LibthEQWF+J7:LpwnrHVGBPn52yt4F+1

Malware Config

Extracted

Family

octo

C2

https://selamcanoonaber.site/ZDljMGYyZTQ3YWRi/

https://hava540derece.com/ZDljMGYyZTQ3YWRi/

https://cehennemdirloo34.com/ZDljMGYyZTQ3YWRi/

https://sicaktanbayilcam52.com/ZDljMGYyZTQ3YWRi/

https://otururkenterliyorum42.com/ZDljMGYyZTQ3YWRi/

https://sicakdanbeynimyandii2.com/ZDljMGYyZTQ3YWRi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.atlotzowj
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4649

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.atlotzowj/.qcom.atlotzowj
    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.atlotzowj/cache/oat/tqampnkfskbkj.cur.prof
    Filesize

    312B

    MD5

    b13c1ec8e9d17651156e5af73be789fa

    SHA1

    7113d0f925fb10f3c4c4a01efb57847027a12a5f

    SHA256

    59afb1a3653b57250c345cb9cdf7b4380965ee6cd0d9c48f23e192714060ee91

    SHA512

    798bdb332713e95dc4308534ac49337559d18a3af4e97b78c4f9340a72e0f5e262119d91aa34d70003fc035fcff0768022bbbf4f320978a80b4fae9620491f21

  • /data/data/com.atlotzowj/cache/tqampnkfskbkj
    Filesize

    448KB

    MD5

    6092d6a7e87603379faa309d45961349

    SHA1

    242d8827535e1519e130b6211e3469fccea05bcd

    SHA256

    f3fd9598445d565a0620cd3e97408168cc812b39eb459d4a3b8b0d4d5cab3b25

    SHA512

    98243ac2cbcd8ccb39fcfe380caabdd7e764fa8656288ccb69fae29278c546f67c57089e8683538578b944cf0e45573771fdff40f8056e06901bffb2417aad7f

  • /data/data/com.atlotzowj/kl.txt
    Filesize

    237B

    MD5

    8988d850d0edce5f4172c91ca6a1cfc4

    SHA1

    2c48a70a3329e5b11ecad72c21e876acb5988015

    SHA256

    6ffa1006199038c4d64a0eefab1f8faa07c48ec8f81241e8a88d48ea2232e710

    SHA512

    20750a4530b4bdd1c426a39c6ac2f512c69505f52405039fb8c41f63c6cc97d710aca553690f0b345a4fc37fe5f594694bf0c56beb8c44a65a03b37f1ce1c883

  • /data/data/com.atlotzowj/kl.txt
    Filesize

    45B

    MD5

    50accf9b163f8d4848aeee4fef272cc8

    SHA1

    b3d3468568b5a014887e9ee4c19ab48cc2de733b

    SHA256

    b04bc5bdf68dabaadd7610a4be1cc1655784c07545479f6fb5df19339ce78991

    SHA512

    a6473d15466d4f99b38a3e6d48756d0bf9b3dc307c73200303151c6f46c4e9fd300cce7a9d762a2f7995541bacb1fecf440661cd2ba38a309be777a0d11b22d3

  • /data/data/com.atlotzowj/kl.txt
    Filesize

    63B

    MD5

    f83015db4e0915acdd700cc45f75518b

    SHA1

    c899627169696519e9832227f16d91bb6c1549f9

    SHA256

    5e2e4258268dcb69c55c9faa354be1a86c003747aaecd7e0ede9961bad33b4e5

    SHA512

    65362500bfa70cf2d5bdf78386825b15a1ef976e9533cb3acad7d8b228a1e04457e5d5d2a1ea93f7af96ee24833ed1eff1c8a705c8b339c6ad9535eb7d996247

  • /data/data/com.atlotzowj/kl.txt
    Filesize

    45B

    MD5

    c953aec073933be06fcf6e0e695aab02

    SHA1

    c54f16d93bc61df07d227cee0ec30bb6b38f28a7

    SHA256

    2899e21ed334cbf4a27f296c66222cc6be38abb5795b1ac10b62f3e15850af52

    SHA512

    4da7c8d85fbb7b8bd5061760e21020ce9e2d1e2b7de8a79ba970bc9fdd275bd3bd6c0782e91774218376b2f80054633ee6edd0b7368a3135245e0b15ff573f3a

  • /data/data/com.atlotzowj/kl.txt
    Filesize

    480B

    MD5

    7ff4632eb67a9d52ce4890ac0de490b7

    SHA1

    a76bb1e39e75433fffc7f70cdcfdd347c4257071

    SHA256

    cce2f61e451751c5eb2d00451efa4de677c9233c9b52141830c137e3f66403f9

    SHA512

    0221dd538595635ab52f682b9f1b39ee357b5ddf372565454f7e26f5788babc71a60b2b0b7e584e3d46251b3ca50a85a1a6cb541b117c29ea69f0cf89b5bdaae