Analysis

  • max time kernel
    47s
  • max time network
    151s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    02/10/2024, 22:03

General

  • Target

    0116fb1dc595768b5cbfd76e9bc01407b7730d9af7d4bbdef2a4babd6df6b374.apk

  • Size

    2.2MB

  • MD5

    1fdb513ca998eae2e1ff33140f25d63f

  • SHA1

    014481ed1c4c5c09746477122313c7b74020d3b6

  • SHA256

    0116fb1dc595768b5cbfd76e9bc01407b7730d9af7d4bbdef2a4babd6df6b374

  • SHA512

    c95a2bcdd7313a3892219a681b5b7ce57781f7b5d57c34fe904e5727a24e246cb896a8b22724fb0a5fb7c691d0d181b6af15e4d49a5254f66f4f24398e06d01b

  • SSDEEP

    49152:vpRT4QDMuGPlzsWbhdGKKy86Kal23+RwSTDOHstKiIGbbWtYWxkEP3v5qz62sGxR:hRsQDMbds6dcIKw23MOH5rdtY5EP3v5+

Malware Config

Extracted

Family

octo

C2

https://dijitaldunyayenifikirlervegirisim.xyz/YjdkMWRjNTllNzZi/

https://teknolojininileriyeniliklerrehberi.xyz/YjdkMWRjNTllNzZi/

https://sanatvedogaltasarimlarincografyasi.xyz/YjdkMWRjNTllNzZi/

https://kulturvesanatprojelerindogalteknikler.xyz/YjdkMWRjNTllNzZi/

https://fotografvesanatgozlemlerinesinlen.xyz/YjdkMWRjNTllNzZi/

https://yemektariflerivedogalurunlerkulubu.xyz/YjdkMWRjNTllNzZi/

https://gezginlericinyenirotalarvetavsiyeler.xyz/YjdkMWRjNTllNzZi/

https://sporseverlericinyeniharaketlerrehberi.xyz/YjdkMWRjNTllNzZi/

https://bilimveteknolojionerileridunyasi.xyz/YjdkMWRjNTllNzZi/

https://egitimvegirisimcilikdunyasindan.xyz/YjdkMWRjNTllNzZi/

https://sanatveguncelprojelerplani.xyz/YjdkMWRjNTllNzZi/

https://dijitaloyunvegirisimcilikakademisi.xyz/YjdkMWRjNTllNzZi/

https://dogalhayatvetatilrehberiniz.xyz/YjdkMWRjNTllNzZi/

https://kisiselgelisimvesosyalmedyayonetimi.xyz/YjdkMWRjNTllNzZi/

https://yasamvedogalyontemlerklavuzu.xyz/YjdkMWRjNTllNzZi/

https://kitapvedijitalokumakulubu.xyz/YjdkMWRjNTllNzZi/

https://sinemavetelevizyonprojelerigozlemi.xyz/YjdkMWRjNTllNzZi/

https://oyunvegencgirisimcilergelisim.xyz/YjdkMWRjNTllNzZi/

https://fotografvegundelikgozlemplatformu.xyz/YjdkMWRjNTllNzZi/

https://yeniseyahatvedogalgeziler.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://dijitaldunyayenifikirlervegirisim.xyz/YjdkMWRjNTllNzZi/

https://teknolojininileriyeniliklerrehberi.xyz/YjdkMWRjNTllNzZi/

https://sanatvedogaltasarimlarincografyasi.xyz/YjdkMWRjNTllNzZi/

https://kulturvesanatprojelerindogalteknikler.xyz/YjdkMWRjNTllNzZi/

https://fotografvesanatgozlemlerinesinlen.xyz/YjdkMWRjNTllNzZi/

https://yemektariflerivedogalurunlerkulubu.xyz/YjdkMWRjNTllNzZi/

https://gezginlericinyenirotalarvetavsiyeler.xyz/YjdkMWRjNTllNzZi/

https://sporseverlericinyeniharaketlerrehberi.xyz/YjdkMWRjNTllNzZi/

https://bilimveteknolojionerileridunyasi.xyz/YjdkMWRjNTllNzZi/

https://egitimvegirisimcilikdunyasindan.xyz/YjdkMWRjNTllNzZi/

https://sanatveguncelprojelerplani.xyz/YjdkMWRjNTllNzZi/

https://dijitaloyunvegirisimcilikakademisi.xyz/YjdkMWRjNTllNzZi/

https://dogalhayatvetatilrehberiniz.xyz/YjdkMWRjNTllNzZi/

https://kisiselgelisimvesosyalmedyayonetimi.xyz/YjdkMWRjNTllNzZi/

https://yasamvedogalyontemlerklavuzu.xyz/YjdkMWRjNTllNzZi/

https://kitapvedijitalokumakulubu.xyz/YjdkMWRjNTllNzZi/

https://sinemavetelevizyonprojelerigozlemi.xyz/YjdkMWRjNTllNzZi/

https://oyunvegencgirisimcilergelisim.xyz/YjdkMWRjNTllNzZi/

https://fotografvegundelikgozlemplatformu.xyz/YjdkMWRjNTllNzZi/

https://yeniseyahatvedogalgeziler.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.denizbank.mobildeniz

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.strike.vessel
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4221
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.strike.vessel/app_expire/cmE.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.strike.vessel/app_expire/oat/x86/cmE.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4247

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.strike.vessel/app_expire/cmE.json

    Filesize

    153KB

    MD5

    aa3de73251ad1dbecce2f47718f94326

    SHA1

    1bf1194b667b6e188fac8c5412de62404eab75df

    SHA256

    3932cacd4a075f16876e81565e725602f3a753756dd512139ccae8539196e6da

    SHA512

    fef03c3aaa7e2fe6c9f81b8aa4cf5c7daf59d8485f7ee86c591a5168536859621bf6dcb8ebc2e1dc4f207ec5c2def112ae49980d32f570d444b75a87ef993d6c

  • /data/data/com.strike.vessel/app_expire/cmE.json

    Filesize

    153KB

    MD5

    e469f2f4b1dc98d74d27af7a0fe38e61

    SHA1

    37d79fa271c90ef82e7e5ff0b063e76fe34bf49c

    SHA256

    46149dfa80d931ebbf0ac34c05b46f5a7216cc7ec93291379495f5703ee2e85f

    SHA512

    5a2c559f843819598abf47f945e33f73cc1d0c27145673e8b994dd7b83cd82c2c1efe5bfc9c284509711f0588af5ec6b43e2d9b3c771913e1e0a0d0e082e3a6c

  • /data/data/com.strike.vessel/kl.txt

    Filesize

    63B

    MD5

    a94004e17b0c195096e26db4ba271c42

    SHA1

    5d544dff0489afde9bc1828aad58b009d4a25285

    SHA256

    37e5470531b7d5c9241d6f29d02d20579d1a1a377f0a09348a2d0cd2d02e9475

    SHA512

    ce928df7f6fe0d00844303326f8cea0d03facc8ee68e19ff9a8299e8da89aff3771aa9b5746c62718627b0ff9e22ab52ece38d59262f5d5851fabe974852ada9

  • /data/data/com.strike.vessel/kl.txt

    Filesize

    423B

    MD5

    c35e80a812dfb75dfcb697270e536edd

    SHA1

    f81f60907490f29d7a132a95b0084be112068f5a

    SHA256

    22f69830fbc5c4a1a642da23f82ec71946b7d9bdec390dbda0e8d98732b048ae

    SHA512

    310881c64a106dd93153a27e2beaaa1aad239ebe652fa45c7fee04bd5531b56fbdcfca99253aea735bb9005bda03a05fd193a2e3907703337395ce9ed184f0f9

  • /data/data/com.strike.vessel/kl.txt

    Filesize

    230B

    MD5

    62c583ba1c7613e3ad845b1f9f960c5f

    SHA1

    c96b2e8ec590d9c670e63e7d0969902124766432

    SHA256

    aaa800986e9ae7b8a171d29e7b4532840a3e2111aede39558149e8b182700ca5

    SHA512

    5c57ce19f67dc7338600981ac80b92dbd6444648e11959535c98e6899d4355cc1c43e87842584ed61841037628b1e245cc6112e86cf067440bffcb9df4db357a

  • /data/data/com.strike.vessel/kl.txt

    Filesize

    54B

    MD5

    e059b9c86e239a3abf33e6abf534ee54

    SHA1

    8343faaecca49266bb428683c3a58c76d02a03ca

    SHA256

    1479e1176244d9366271c50ca57004c719e9f39f7fd3b0c0a9529173e3f69a09

    SHA512

    0c70b762e8beee162911e5934a6a4f4853469ae04bdf8f89a2e4baa07bc5d305fcad2157b6fcbc457e60c22a93935e9e2890ba497ace9977c6c981da6182e008

  • /data/data/com.strike.vessel/kl.txt

    Filesize

    79B

    MD5

    b8c59356a67b8884d3777de3bf988eae

    SHA1

    d1878c434ee3a89692ffe883efd6772baae7732d

    SHA256

    a32e11a1de7a452bcdd85dcc16afbf4e1dc9f9cd4666f5ea2f4633b7d9db133d

    SHA512

    f2e69daa49f94ff1e70a94e7d1624efaf062beb1b09a02a0b26d58c4765795eeb3abe3b631be22a495e4704ad5546a2322daf8fb3da42646fe1becf6ce586f68

  • /data/user/0/com.strike.vessel/app_expire/cmE.json

    Filesize

    451KB

    MD5

    d1f4dc3aee35cb9c3f7832cd22b6c421

    SHA1

    4abe292fccc95162ac635f17eb72fbc8aea0851d

    SHA256

    1ecc7c3e70cc24aa34b51bb0bf48be4f9345dccf4013d34975756131a00e3584

    SHA512

    cfd55b1ecde8c00c79370ff82b901262a7575d5bbf3cd0555d7d2425256ad96e62596095fca62b2e5f10476141b4d4d92026feb4156826ab0effa3d2d311fbcf

  • /data/user/0/com.strike.vessel/app_expire/cmE.json

    Filesize

    451KB

    MD5

    1a3ed7e986d0e2414b11ab79fd3b6c61

    SHA1

    599e2933e03dae6c6f44c9e30270753237810f0b

    SHA256

    a0e2f80fa14943d3c45f20b2884f618467ebd91766a3caa7253f514b3139e2af

    SHA512

    12b62c3d36a7be2cf85fd9cf1927887f623f9889b5dadfa7710fd7043e9ebb52f396b6d234283613c5bea14088a58bc7a40f3f1de0c98c39df8da37c002a196f