Analysis

  • max time kernel
    54s
  • max time network
    159s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    29/09/2024, 22:00

General

  • Target

    c4e5934ebf0d8f81c43ee522522534d025787db5ccf5e8059a3a2a9611e2e485.apk

  • Size

    2.7MB

  • MD5

    dfb9b391b769ccb80dc53cb41d60513b

  • SHA1

    577c817b0dc3ad8963b0624e4a77d07f8258b328

  • SHA256

    c4e5934ebf0d8f81c43ee522522534d025787db5ccf5e8059a3a2a9611e2e485

  • SHA512

    6ce82e12f5c41529d42b1135b2ce0dad3f6de8ca97689757465214e69d77fc44218408cd5502c31519d280374bf1800b5fed765040e6fbdbf0259438162813b8

  • SSDEEP

    49152:0EhGplJn+qFz+Jr+Ns9CSd5QZxFGlKSA+/a5LV6kZZiYEXx44QXmLeqayHmXrv3m:jiYMXmISrQZbMhbULwKb61QwHmTqwZvC

Malware Config

Extracted

Family

octo

C2

https://dijitaldunyayenifikirlervegirisim.xyz/YjdkMWRjNTllNzZi/

https://teknolojininileriyeniliklerrehberi.xyz/YjdkMWRjNTllNzZi/

https://sanatvedogaltasarimlarincografyasi.xyz/YjdkMWRjNTllNzZi/

https://kulturvesanatprojelerindogalteknikler.xyz/YjdkMWRjNTllNzZi/

https://fotografvesanatgozlemlerinesinlen.xyz/YjdkMWRjNTllNzZi/

https://yemektariflerivedogalurunlerkulubu.xyz/YjdkMWRjNTllNzZi/

https://gezginlericinyenirotalarvetavsiyeler.xyz/YjdkMWRjNTllNzZi/

https://sporseverlericinyeniharaketlerrehberi.xyz/YjdkMWRjNTllNzZi/

https://bilimveteknolojionerileridunyasi.xyz/YjdkMWRjNTllNzZi/

https://egitimvegirisimcilikdunyasindan.xyz/YjdkMWRjNTllNzZi/

https://sanatveguncelprojelerplani.xyz/YjdkMWRjNTllNzZi/

https://dijitaloyunvegirisimcilikakademisi.xyz/YjdkMWRjNTllNzZi/

https://dogalhayatvetatilrehberiniz.xyz/YjdkMWRjNTllNzZi/

https://kisiselgelisimvesosyalmedyayonetimi.xyz/YjdkMWRjNTllNzZi/

https://yasamvedogalyontemlerklavuzu.xyz/YjdkMWRjNTllNzZi/

https://kitapvedijitalokumakulubu.xyz/YjdkMWRjNTllNzZi/

https://sinemavetelevizyonprojelerigozlemi.xyz/YjdkMWRjNTllNzZi/

https://oyunvegencgirisimcilergelisim.xyz/YjdkMWRjNTllNzZi/

https://fotografvegundelikgozlemplatformu.xyz/YjdkMWRjNTllNzZi/

https://yeniseyahatvedogalgeziler.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://dijitaldunyayenifikirlervegirisim.xyz/YjdkMWRjNTllNzZi/

https://teknolojininileriyeniliklerrehberi.xyz/YjdkMWRjNTllNzZi/

https://sanatvedogaltasarimlarincografyasi.xyz/YjdkMWRjNTllNzZi/

https://kulturvesanatprojelerindogalteknikler.xyz/YjdkMWRjNTllNzZi/

https://fotografvesanatgozlemlerinesinlen.xyz/YjdkMWRjNTllNzZi/

https://yemektariflerivedogalurunlerkulubu.xyz/YjdkMWRjNTllNzZi/

https://gezginlericinyenirotalarvetavsiyeler.xyz/YjdkMWRjNTllNzZi/

https://sporseverlericinyeniharaketlerrehberi.xyz/YjdkMWRjNTllNzZi/

https://bilimveteknolojionerileridunyasi.xyz/YjdkMWRjNTllNzZi/

https://egitimvegirisimcilikdunyasindan.xyz/YjdkMWRjNTllNzZi/

https://sanatveguncelprojelerplani.xyz/YjdkMWRjNTllNzZi/

https://dijitaloyunvegirisimcilikakademisi.xyz/YjdkMWRjNTllNzZi/

https://dogalhayatvetatilrehberiniz.xyz/YjdkMWRjNTllNzZi/

https://kisiselgelisimvesosyalmedyayonetimi.xyz/YjdkMWRjNTllNzZi/

https://yasamvedogalyontemlerklavuzu.xyz/YjdkMWRjNTllNzZi/

https://kitapvedijitalokumakulubu.xyz/YjdkMWRjNTllNzZi/

https://sinemavetelevizyonprojelerigozlemi.xyz/YjdkMWRjNTllNzZi/

https://oyunvegencgirisimcilergelisim.xyz/YjdkMWRjNTllNzZi/

https://fotografvegundelikgozlemplatformu.xyz/YjdkMWRjNTllNzZi/

https://yeniseyahatvedogalgeziler.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.denizbank.mobildeniz

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.hurt.kind
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4249
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.hurt.kind/app_skirt/FbE.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.hurt.kind/app_skirt/oat/x86/FbE.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4274

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.hurt.kind/app_skirt/FbE.json

    Filesize

    153KB

    MD5

    cdb290968f517813f9200bb4f09c00cf

    SHA1

    cbb2476da82dda779f19725c0ff28be508945570

    SHA256

    26fc9c698b766246358e134f0a7a80ed7e9140702d2929d29a8fe960f7c3e73b

    SHA512

    dab8c50aa6e0348e1b56e4ac66593be5d0f320d9f4e15403aeaf4353646f53b3bb01c3729289389630c08d016a3d7e1d0bad83660e0b1f23bfeca81d5a5a8cf7

  • /data/data/com.hurt.kind/app_skirt/FbE.json

    Filesize

    153KB

    MD5

    f5d528bf7c5c1d3a3530227ec728f9d3

    SHA1

    66252b4c303fda61da60b74e1f0c11086214baf0

    SHA256

    763960e0ef0ebc7695892c3db1759ff52bd25ea05efd8da08ecb5d6881ec27b2

    SHA512

    94acb4fe223e66e415abbc33ded278feab4c8c58d240d3d7d9a5e9744a53383246dab5dae1ce86e5cf6e2afda28e22f6a31cff5ec03ba979f71d97afb14e3fd7

  • /data/data/com.hurt.kind/kl.txt

    Filesize

    63B

    MD5

    010368eb23b91bddb76df1207ba44bb6

    SHA1

    44267a854c4cba591f900b478d753ab8e106eb4e

    SHA256

    917b9a5416f203572c160d9d606f4639f38a5082ed8287075194851043aa1b43

    SHA512

    d4302da4474b641e57dcb8d199de9dcda80a69a555307d2cd3ae45ad88efd0275de9103d82568fdb9115b71ba9876b0cb6b44e6f84212858b193c4323a71365d

  • /data/data/com.hurt.kind/kl.txt

    Filesize

    423B

    MD5

    11a59395892c34c24a394dc904b2b785

    SHA1

    7918771bc97167345942f4a022dcd2780e5bde99

    SHA256

    5a4022473851c67251930d44de50727200f0ae280ab4f01d8106af79f5b32971

    SHA512

    8d12b23727691e12eff15f8d37ce5749ded5f5c744895871f0db3b0171d8c3ff6cac325c91f4534a3dea34ad49349e1430c4c16e107faede442f23742630e8d5

  • /data/data/com.hurt.kind/kl.txt

    Filesize

    230B

    MD5

    52ff8ccf3422f5f4e104af89fa67522e

    SHA1

    8e7916746fdb93aa9a94bc76c469b8bddee105dd

    SHA256

    cab42d924a13b7872e03495110b9d11a1c52866f1eb841e1c28d8ad13561b851

    SHA512

    4f46d68945a13d9a6e6ca57e8a2e1fde1dcd2b8ed2df1c2515c486ff21eccca6458a84eacc36e6e458d10aa745f096a6969414470d0e366384061c8bd9bba107

  • /data/data/com.hurt.kind/kl.txt

    Filesize

    54B

    MD5

    5a40e8cf98daeac86bda0212d70593dc

    SHA1

    b9984eeb8c55f634724979c03e855eba144cc4cd

    SHA256

    acf46990ae104f92d1a1ee67866dbb0ef7a43088cbc652cbca587f718c53dace

    SHA512

    6e1a3a2bcf643bed2bb27ac4c7f25b03d3bedb86c4cfea737c53f9239b7cb4c9ddf98aa03b824824ad336b6d8a66bfe7c289da052b47d0dc639b9bc457fe35de

  • /data/data/com.hurt.kind/kl.txt

    Filesize

    63B

    MD5

    38d8ddd265d1af2829a6c22c762d853e

    SHA1

    2dad55d5569c790df9375e423a163f20d0bb21c8

    SHA256

    a5e21face63bccb0b2da2b00a33595466aa6f07b7ed6c1bc7695b9118bd8155f

    SHA512

    2ecac9cabd60af44eb8ab7cbcfba075ab2e62fd29f4e2dfc20bd17b1c40ea8c5c54500157dd8a2ed9d6a3d326cb58ffd2adf8517e604a75fbef66d03f21289b9

  • /data/user/0/com.hurt.kind/app_skirt/FbE.json

    Filesize

    451KB

    MD5

    ad60bfdbd782cbb274aff92cd7eb3a30

    SHA1

    0b40e571c4b5ad04e9d3229f50c1ff4a8adf8107

    SHA256

    9aa0994611a68f660e0f3f25bb645847df804167953ada9658d23606a84a2627

    SHA512

    265ef020fcc9096adeb041f58c1079b851f776a91012bdf2843215c98e1066a8acf0f948cc327076746499dd83fff28e25c182f91b0d20251f41eb035afe9d70

  • /data/user/0/com.hurt.kind/app_skirt/FbE.json

    Filesize

    451KB

    MD5

    3e9ba6ecc2ca5b85b7ee3b81b60f726a

    SHA1

    1635253987f0576b6232b4636f3c8aeac7006f69

    SHA256

    3c518acd85f95fa05abf2c7e87944a61b24d92dba09ab944245be122ac402fdf

    SHA512

    4410f46ea82304b7c01a20d39456802b9f0347dbb7e890a07981a03bb2773e32b41bed64f131a88ef9ade7ab654b10613b003e870e08120e09b8c7e8aad76790