Analysis

  • max time kernel
    49s
  • max time network
    141s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    05-10-2024 22:05

General

  • Target

    1dc3666b646cc498815819c5030b43ca2ef0f28d53581be61492ead275c6615a.apk

  • Size

    1.8MB

  • MD5

    4156ec20bbbf89bbef0fb3ef9f4ab1ef

  • SHA1

    36cb21bf917ad42d7451d8ec0e45b2f1f23f7b30

  • SHA256

    1dc3666b646cc498815819c5030b43ca2ef0f28d53581be61492ead275c6615a

  • SHA512

    b0ad9ec094ec87e72b571319ff7088f42796ae013e8ce6c8f7f2ff158fcb1f19d9a88a51391402e5501b9d4893cfefd6b03c2f54984494525abb3cdb2825b4c3

  • SSDEEP

    49152:MOsv1inIMDM51oYnHKGY8oQyXFYQhmsl3:PA8fVYnHKGNoQyVZFl3

Malware Config

Extracted

Family

octo

C2

https://dijitaldunyayenifikirlervegirisim.xyz/YjdkMWRjNTllNzZi/

https://teknolojininileriyeniliklerrehberi.xyz/YjdkMWRjNTllNzZi/

https://sanatvedogaltasarimlarincografyasi.xyz/YjdkMWRjNTllNzZi/

https://kulturvesanatprojelerindogalteknikler.xyz/YjdkMWRjNTllNzZi/

https://fotografvesanatgozlemlerinesinlen.xyz/YjdkMWRjNTllNzZi/

https://yemektariflerivedogalurunlerkulubu.xyz/YjdkMWRjNTllNzZi/

https://gezginlericinyenirotalarvetavsiyeler.xyz/YjdkMWRjNTllNzZi/

https://sporseverlericinyeniharaketlerrehberi.xyz/YjdkMWRjNTllNzZi/

https://bilimveteknolojionerileridunyasi.xyz/YjdkMWRjNTllNzZi/

https://egitimvegirisimcilikdunyasindan.xyz/YjdkMWRjNTllNzZi/

https://sanatveguncelprojelerplani.xyz/YjdkMWRjNTllNzZi/

https://dijitaloyunvegirisimcilikakademisi.xyz/YjdkMWRjNTllNzZi/

https://dogalhayatvetatilrehberiniz.xyz/YjdkMWRjNTllNzZi/

https://kisiselgelisimvesosyalmedyayonetimi.xyz/YjdkMWRjNTllNzZi/

https://yasamvedogalyontemlerklavuzu.xyz/YjdkMWRjNTllNzZi/

https://kitapvedijitalokumakulubu.xyz/YjdkMWRjNTllNzZi/

https://sinemavetelevizyonprojelerigozlemi.xyz/YjdkMWRjNTllNzZi/

https://oyunvegencgirisimcilergelisim.xyz/YjdkMWRjNTllNzZi/

https://fotografvegundelikgozlemplatformu.xyz/YjdkMWRjNTllNzZi/

https://yeniseyahatvedogalgeziler.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://dijitaldunyayenifikirlervegirisim.xyz/YjdkMWRjNTllNzZi/

https://teknolojininileriyeniliklerrehberi.xyz/YjdkMWRjNTllNzZi/

https://sanatvedogaltasarimlarincografyasi.xyz/YjdkMWRjNTllNzZi/

https://kulturvesanatprojelerindogalteknikler.xyz/YjdkMWRjNTllNzZi/

https://fotografvesanatgozlemlerinesinlen.xyz/YjdkMWRjNTllNzZi/

https://yemektariflerivedogalurunlerkulubu.xyz/YjdkMWRjNTllNzZi/

https://gezginlericinyenirotalarvetavsiyeler.xyz/YjdkMWRjNTllNzZi/

https://sporseverlericinyeniharaketlerrehberi.xyz/YjdkMWRjNTllNzZi/

https://bilimveteknolojionerileridunyasi.xyz/YjdkMWRjNTllNzZi/

https://egitimvegirisimcilikdunyasindan.xyz/YjdkMWRjNTllNzZi/

https://sanatveguncelprojelerplani.xyz/YjdkMWRjNTllNzZi/

https://dijitaloyunvegirisimcilikakademisi.xyz/YjdkMWRjNTllNzZi/

https://dogalhayatvetatilrehberiniz.xyz/YjdkMWRjNTllNzZi/

https://kisiselgelisimvesosyalmedyayonetimi.xyz/YjdkMWRjNTllNzZi/

https://yasamvedogalyontemlerklavuzu.xyz/YjdkMWRjNTllNzZi/

https://kitapvedijitalokumakulubu.xyz/YjdkMWRjNTllNzZi/

https://sinemavetelevizyonprojelerigozlemi.xyz/YjdkMWRjNTllNzZi/

https://oyunvegencgirisimcilergelisim.xyz/YjdkMWRjNTllNzZi/

https://fotografvegundelikgozlemplatformu.xyz/YjdkMWRjNTllNzZi/

https://yeniseyahatvedogalgeziler.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.denizbank.mobildeniz

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.page.limit
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4320
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.page.limit/app_scare/IgW.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.page.limit/app_scare/oat/x86/IgW.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4348

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.page.limit/app_scare/IgW.json

    Filesize

    153KB

    MD5

    5c32f009f759e9769ff2e90434f9f287

    SHA1

    f752c9e9694b6354d259fc6e3e95ef40da55afb4

    SHA256

    89a4d51c3e7775ccf0a53cb7ff0ee84c6ead9696825b5528ef7e9374204f4fc1

    SHA512

    8d05c75b8f48892aa68bf23edfb0f8e9a8ef90017480d01c9b68b906888200571a1c142518503a1b754710223eb22e16016ab233ee5ba1059f1789a8b6ee79f6

  • /data/data/com.page.limit/app_scare/IgW.json

    Filesize

    153KB

    MD5

    e335b221615ff1eab64af86575c7783b

    SHA1

    01f3b0aca09218b9cc8cfa0973cdd4c46f5e9fa5

    SHA256

    e323b6e557ae933b51cb0e141b3648fc39f4c2dc15bcb98b739f4f33d4bd348b

    SHA512

    bea9c998cd09583528176e6d025e0b1ccf5c584e65b12dcc3f3afb1d60492da4b36a82a0d765116e8ae32848dc05d3076f75c7f1350206c52e8925086f9af407

  • /data/data/com.page.limit/kl.txt

    Filesize

    63B

    MD5

    7f5602564d0369f997aa1a9f5503da9b

    SHA1

    59045499dd5aeeb9556316bc20766e3517d8b896

    SHA256

    bc584bc585bce778caaf2ebd872a301a15889be94ba5c1bd5a96b7b879614a3b

    SHA512

    ad800a86a842a990e2454b40a22426bc4798725ad04da777a40898de7d79859bb25b255c0776af83df6127d06ca851b59322c28b87b850d83b05a6e884ea73c7

  • /data/data/com.page.limit/kl.txt

    Filesize

    423B

    MD5

    495a38f54c4f2f472ecd2fdfc2c9b424

    SHA1

    fd01fdee31dbd42357656692a6ceb696f6f87fb6

    SHA256

    78269f234f9bce98569be40a8e48cc50532be88e53d146927fafd85b7c1b1fc0

    SHA512

    4c09bd0d0c27de145af877cbbd18b6457cf13db099c83a3e305c76864b7e67051190af9757bbb975911b713d7d8077969f3c6255dc7bf7957cbfe1777f896e7a

  • /data/data/com.page.limit/kl.txt

    Filesize

    230B

    MD5

    7ce942491596c8cd0511d1c5f2b3f029

    SHA1

    60bab66ccce425ce0eb3e3ff69e25b30ef940f16

    SHA256

    3074d255b4fd5d4e27f7ed927fec8a00acb0c3b274a29915ce1aa1dd37af3c89

    SHA512

    4ab0d5a8e3af03ae83d1b85034f2e37e8feb36e73c98524499f1dc783d93762d1b5b4e0ea7fcb1eb672ec5e1142360119c7acd7eafec29db10eee44caa4a4035

  • /data/data/com.page.limit/kl.txt

    Filesize

    54B

    MD5

    fd96a26b932a9ac6f2bb116b3904e368

    SHA1

    f258b7e20403c94f9705a4fdda131691f7170f43

    SHA256

    ff560c1a119a53702d5fe94be8a277caff6b3d88d8a1cb9a32ac3522da8d7c46

    SHA512

    4c640b0a613f7c54e34f2e31f7ad475bb5488b242e83f4fcb8106b958875a8e818915c3ccef04f0a86ec4ec29b7f1e26c23e64054ab34a568b13f5461839b315

  • /data/data/com.page.limit/kl.txt

    Filesize

    68B

    MD5

    9dbc5c7538d9c75a9c81f8dbe07a63c4

    SHA1

    14906bfcbf7ca801bb2b0f876d6d98b32e7514f8

    SHA256

    787b94a9ca1c159f4959d4587e61b37bd3c5eb27388c172cca2e7d7a8dc3da7b

    SHA512

    ddaf5a5b3dccf676119750995021211430ce39b5d4f9a8b361530c16953d20de46f6e865e63ad61d06a22ad66a0fbfc74ae99bc71a1a6aa9b9935d466f91202c

  • /data/user/0/com.page.limit/app_scare/IgW.json

    Filesize

    451KB

    MD5

    7ccccb99178031b6086a54a53de03e06

    SHA1

    ccac7e347f850c8d699a6784a3d3c9dc93e74d9a

    SHA256

    cfa6049b2972ad8250457f29491b5d0f9f01747056256189ca900f78779c4ad0

    SHA512

    0fbd9b79a85f4b641e9db873b2dfebd125a3e8d49ee9eabb071002af201e9df3b0913fda5df093b1c8dcc88e1716ef4ef49e1a8bdb656c0ad9a8ab1b46777a9d

  • /data/user/0/com.page.limit/app_scare/IgW.json

    Filesize

    451KB

    MD5

    65fdb6bf7fbfcc9cbcbf0131434f1efd

    SHA1

    3e7e0003db6397ec8524033f4fe0bd50844ebf19

    SHA256

    af1d23d1e2a1c8fad407a4c39137537789ca2c11ce97a788bbc2cc9ba038d37a

    SHA512

    992d855482509830058cbd563d2c6d1e658fd235263f382f10d2c9000a513e2a918e0bf128eb2311eafcf82f90e29d34e6fb47d0681ec0b190b143fb2d144f13