Analysis

  • max time kernel
    34s
  • max time network
    150s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    14/09/2024, 22:06

General

  • Target

    573163b091289004ecfce8e4d593692522c5262c3c6a858be1d753dc10824f55.apk

  • Size

    2.1MB

  • MD5

    d6da6e3b54f9f7a71df02255cd968835

  • SHA1

    1f5cec842998b2565239cedea6350349b8741a97

  • SHA256

    573163b091289004ecfce8e4d593692522c5262c3c6a858be1d753dc10824f55

  • SHA512

    0c2511a7c624c8e124a58d1508f79e20c3f83b2e41f32c04558ce19cc206f3bd64b40950b40b1bda6a5c94e57f253f1ac19fa2fa5b4ca0877a646e410202003e

  • SSDEEP

    49152:wamrFa6MCZwI61VvDsdfhIXOI1znyWG4yrnZIWlFIaC/GnDuLxqg8G5i:w26MCZbILsdfaX91GuiIWlFC4DEQTh

Malware Config

Extracted

Family

octo

C2

https://modadunyasi.store/YjdkMWRjNTllNzZi/

https://eglencelieglence.fun/YjdkMWRjNTllNzZi/

https://ucuzucusahane.icu/YjdkMWRjNTllNzZi/

https://bebekbakimrehberi.baby/YjdkMWRjNTllNzZi/

https://denizsefasi.boats/YjdkMWRjNTllNzZi/

https://tatilcenneti.xyz/YjdkMWRjNTllNzZi/

https://sagliklitatlar.store/YjdkMWRjNTllNzZi/

https://oyunzamani.fun/YjdkMWRjNTllNzZi/

https://bilgiplatformu.icu/YjdkMWRjNTllNzZi/

https://cocukoyunlari.baby/YjdkMWRjNTllNzZi/

https://yelkencilik.boats/YjdkMWRjNTllNzZi/

https://genclikfestivali.xyz/YjdkMWRjNTllNzZi/

https://herkesicinkitap.store/YjdkMWRjNTllNzZi/

https://muzikevi.fun/YjdkMWRjNTllNzZi/

https://yenibaslayanlaricin.icu/YjdkMWRjNTllNzZi/

https://bebekoyunlari.baby/YjdkMWRjNTllNzZi/

https://sualtikeifleri.boats/YjdkMWRjNTllNzZi/

https://kulturvesanat.xyz/YjdkMWRjNTllNzZi/

https://sanatkitapligi.store/YjdkMWRjNTllNzZi/

https://eglenceparki.fun/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://modadunyasi.store/YjdkMWRjNTllNzZi/

https://eglencelieglence.fun/YjdkMWRjNTllNzZi/

https://ucuzucusahane.icu/YjdkMWRjNTllNzZi/

https://bebekbakimrehberi.baby/YjdkMWRjNTllNzZi/

https://denizsefasi.boats/YjdkMWRjNTllNzZi/

https://tatilcenneti.xyz/YjdkMWRjNTllNzZi/

https://sagliklitatlar.store/YjdkMWRjNTllNzZi/

https://oyunzamani.fun/YjdkMWRjNTllNzZi/

https://bilgiplatformu.icu/YjdkMWRjNTllNzZi/

https://cocukoyunlari.baby/YjdkMWRjNTllNzZi/

https://yelkencilik.boats/YjdkMWRjNTllNzZi/

https://genclikfestivali.xyz/YjdkMWRjNTllNzZi/

https://herkesicinkitap.store/YjdkMWRjNTllNzZi/

https://muzikevi.fun/YjdkMWRjNTllNzZi/

https://yenibaslayanlaricin.icu/YjdkMWRjNTllNzZi/

https://bebekoyunlari.baby/YjdkMWRjNTllNzZi/

https://sualtikeifleri.boats/YjdkMWRjNTllNzZi/

https://kulturvesanat.xyz/YjdkMWRjNTllNzZi/

https://sanatkitapligi.store/YjdkMWRjNTllNzZi/

https://eglenceparki.fun/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.denizbank.mobildeniz

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.gesture.attack
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4258
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.gesture.attack/app_artwork/WHsFKuZ.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.gesture.attack/app_artwork/oat/x86/WHsFKuZ.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4288

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.gesture.attack/app_artwork/WHsFKuZ.json

    Filesize

    153KB

    MD5

    302b223a8924ca26ca30808306b37441

    SHA1

    fec0127b9724adaf271a5308705c663358e3c912

    SHA256

    3532856ea29204cd24f8da605de384deb9fe59cb92506b14a3455f054837c487

    SHA512

    83e14744ce0b4cf6decd52c5f442ca0e5e8f2bf2d20e75ba2638ec565a2fb74d3ff0432fea58a74b95bf598789ec0b4be23c0976a88172c887d9d08e6cde955c

  • /data/data/com.gesture.attack/app_artwork/WHsFKuZ.json

    Filesize

    153KB

    MD5

    671b478c9a06fb15d4e45b7f63843792

    SHA1

    39967fe2f901cac220d9d49f5c8ca5f4f72c3070

    SHA256

    8604d8617af1ff48169d5754067756fa594741728b9d1bfff47fc27bd49d2cb1

    SHA512

    b2cd3f01ebaa197be679251b6bfbf820a180a8d1a919eb3712a9bb0a7ace6b9faa531f8a241a7552db03a733dbb1fb0505c19827b9db7fa67481bea89dfd6342

  • /data/data/com.gesture.attack/kl.txt

    Filesize

    63B

    MD5

    c6adbfdf55ad4556ac459ab6da56b1dd

    SHA1

    9112d9ab6446d051fb06407f200e4e7914efccb6

    SHA256

    aab14d667acae2fa1874b8702272c2dc43bba43b1adf20175f5a2fda5d3285cd

    SHA512

    214d09295d4f96f845f0fe892b54b2c826afa56b99dfdc90ad7c8d884af8121adb78cc918d1aa42fdfae288b8c54730422ea758179e5d72bb54ece9725b808df

  • /data/data/com.gesture.attack/kl.txt

    Filesize

    423B

    MD5

    d200c2ff3b2a8a5526070a08940460bd

    SHA1

    7c14c762c0c15cb14bcf48d5b321b23c48921633

    SHA256

    188464ba55e4e050a0fe7949c3df088f598f7f300937d61017a7150bd08ae578

    SHA512

    0c8134c57cdcaf84ca67d49b2c1257b516b972ba76902d1970fea07612eb35ba0d0d5b5563394231d38e3896490779bcc3369e6bbe91e24aef4e09cac785c92f

  • /data/data/com.gesture.attack/kl.txt

    Filesize

    230B

    MD5

    35acb1b9592a5af0a4a8b36e561324ea

    SHA1

    4830b2cdc9f90f9df38c3e71632e107e0b46256b

    SHA256

    8c460bddb31f536b2ac156101f075e4add96ae925546ec989be4259435e23272

    SHA512

    2b129bb18d9e803fba0b46cdf61a7b2d6d7b405ccfe2d69b3e9daa148834314b7af86793f3c97418fc1bb861271394a5ac17e22ce11b938d4b03bfe8ccbe141b

  • /data/data/com.gesture.attack/kl.txt

    Filesize

    79B

    MD5

    efd19858a34cb6b22209305564dcd352

    SHA1

    79bc3e9d66badc81fb55e6d0fb6457d241777096

    SHA256

    cb9f375fa0efaae41e7b64962dd8f17eecdade23810349bcced5fe358a023ffe

    SHA512

    fdacfa4a218603b7e244d18b926799e536326251023008832c35f0a00c49f93823d58988bc33b9526914ae5f851df99160479555592b8e150251cb71d4a5955b

  • /data/data/com.gesture.attack/kl.txt

    Filesize

    54B

    MD5

    56c654e39a083ebf2f4bfd98fa93b756

    SHA1

    9163f3c23be98311f3ff11a2c622f82c562111a4

    SHA256

    7c8936596eb22162b58f167d8938ea20ad5d27076a42e9d991cf0cf65c99037f

    SHA512

    eb65b37ede0634bbf11ba342907f2a97defda58752bdf934bbd30c1a87feef89356e8832dbea284b19060fed5a4208ca3319cf1a924bbe2411925701e52792e0

  • /data/user/0/com.gesture.attack/app_artwork/WHsFKuZ.json

    Filesize

    450KB

    MD5

    38d2009ab306a4f96ffc5f7c72eda220

    SHA1

    3c29daaf589e6fe2dadedbd1d358e8800ec025a3

    SHA256

    8c61fc97911435f3b84125593096b425dddcb258566650228c6e83842c914396

    SHA512

    037201ea6aeced32ecf9dfa2140b2da51058e81fe10b767a91e970cd22e7096a4e56f51c95229018d8053226c23d534bed7594048c0dd6a86bd1fa5652db1979

  • /data/user/0/com.gesture.attack/app_artwork/WHsFKuZ.json

    Filesize

    450KB

    MD5

    3c10ed217421a0964fe02e369a0fdf66

    SHA1

    160b8c117ed09745d13eb53eeed8984788a27043

    SHA256

    74c59e2a666ae1a5633fce34c2ea44730a80c3ec5769cc78d06bc563d999f945

    SHA512

    d11f85d72efc8219b282a571802058cecec2fd483e441cacae19ad99515cc24ec6fcf5381a939139c6d738eeb012aca5ec865d13ba1abe1d46b6521031a90d83