Analysis

  • max time kernel
    140s
  • max time network
    134s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    07-10-2024 22:01

General

  • Target

    df0bd1558c590dc00ce18598cdbfeaa8917a95ffb7b55ac0ffb11c824a127ec3.apk

  • Size

    2.7MB

  • MD5

    19268edaeaf87a374dd42a452cf3726d

  • SHA1

    49e28ed786e0905c91423434a1fa5685bc0efc99

  • SHA256

    df0bd1558c590dc00ce18598cdbfeaa8917a95ffb7b55ac0ffb11c824a127ec3

  • SHA512

    9b356043f93a580577b1d07ed96693f5567dacfcb7495302e4716a3c51372c0f36ac358f241b9e9457526397565ff719aa296c80bbf7c3f38d1a41478930abea

  • SSDEEP

    49152:LYvk6Kjcf1ObPyI4trAm8a8KLGBHzFOTkCMmn6U9BrVT9mDl8r601sS8IQg:LY8FjEI4iZaUzYH99yIp

Malware Config

Extracted

Family

octo

C2

https://94.156.104.71:7117/gate/

https://94.156.104.71:8080/rootmd50ma/panelcgfuzwxleg9kdxnvy3rv/gate/

https://94.156.104.71:80/builderxxxzzz/gate/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.nameown12
    1⤵
    • Removes its main activity from the application launcher
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4256

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nameown12/.qcom.nameown12

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.nameown12/kl.txt

    Filesize

    230B

    MD5

    04f193b08e1397efdc3752c1e8cffbcd

    SHA1

    78335c0f27cf033223836b5ad050ad86940d8d04

    SHA256

    e64cf1c82e782f0da6ced9428a538ea66524ccaa0c938ebd06bc2604d430c2d4

    SHA512

    690225628155ecc697159bc7a21838f8cc5b483163db0c78961084febc620bc637820cf425b6f39172991a55d39ddbea4d06e7d2c30cee2c356090a35f45082c

  • /data/data/com.nameown12/kl.txt

    Filesize

    54B

    MD5

    f48393333714c7188cb12083c0e22e1a

    SHA1

    27f269cd46d6ebfbc5a6ae8508b875c1b399344d

    SHA256

    fc95b76960b69506b226fa778ad575f2ab8ef6a51277af8948dcf28f54368d17

    SHA512

    dc418394d43463786ef3054af3178deb18edfc2af9ad4d856ef2acb6a4cd044cdd464ceec65f8fd9fd0a89caef266357d6ca46fef070a0244bc14686f025bc15

  • /data/data/com.nameown12/kl.txt

    Filesize

    68B

    MD5

    f45259cad7d95062bb650a055ceb34ea

    SHA1

    9f0ba79053ca6d1427cefe27e2e1ac2559969530

    SHA256

    390322e5a545410006650c8e3d24c1d9c47a216d470b2ca85a6288fb38165670

    SHA512

    4811e9bb66e554ea499d0b07959ab173b396d147a94fb6b603e2406c406baa69553a2ecb98c276bacba2f4b97980e2acb2556522f7cb4b560d46aad3935bab46

  • /data/data/com.nameown12/kl.txt

    Filesize

    63B

    MD5

    b25112a23de0e0cd55ea1c9f3e7db4ce

    SHA1

    33c96c74fdddc75b4a1a0ab5597b127d61f102de

    SHA256

    0bdbf66d016c2e40f6a99555769d6546b44116ccbc877c895feb49beb2278263

    SHA512

    f70151dbd1c20163461abed895e14b02529433f0bc1e810603842db5ce95679741deab2286f1a1ac5ef3ed34311e5426a15b18cd818d3d8a2ee7d3d6859953e2

  • /data/data/com.nameown12/kl.txt

    Filesize

    423B

    MD5

    fead2e1a311194bebe7c01abf90d88a1

    SHA1

    bbfa58280bc47b1065382aec8b3da2b34294f984

    SHA256

    4635e76af8b40cbc5b78c7add06f132837476cf04c8e99b2ade5e42ede7122f5

    SHA512

    b4c4538e44fef46a822d2af0564dd6dda6ae63c98589a0b927afe3639d5aff966868fa3b6a7c2c8285dc6df55b148dbd7ddd8dee311d1cb1c850fc57d38c1f9e