Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    12-10-2024 22:00

General

  • Target

    b3bcfcdefe9e60b016f97f1429af8b36cbd6690e794167c135d9a668125ad79a.apk

  • Size

    4.8MB

  • MD5

    951cf2360764278d7071683d8ffa98ff

  • SHA1

    1c2d5fa7e0269c8bd12e189e6b1b2e9dbad23cd9

  • SHA256

    b3bcfcdefe9e60b016f97f1429af8b36cbd6690e794167c135d9a668125ad79a

  • SHA512

    7dd0f70f894c08a5fe8e910d4117644b71a67d870b382d0dc685b4e9d8fdb55294bbc8560e0b841d65f0d6882945cee6a56a7963d8268008c3beaaa3ba1e26fe

  • SSDEEP

    49152:FRsEXTPC5SKoc3XDf45iS7xrGyQtdHbGjVKScGl/8CWkSl+wSMUPETT:FRsgC5SJc3X05iSRG1wVK6TSlLEETT

Malware Config

Extracted

Family

octo

C2

https://af0638fa251b72731774b669425abb2c.net

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.garanti.cepsubesi

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Signatures

Processes

  • com.transparentchrome_frame73
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Launchs application uninstaller.
    • Makes use of the framework's foreground persistence service
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Tries to add a device administrator.
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4461

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.transparentchrome_frame73/.global.com.transparentchrome_frame73

    Filesize

    265B

    MD5

    04665ab838d938a0eb5aeece4b27de71

    SHA1

    78e28f7c7c7accf855f1a41cf147472210b96a92

    SHA256

    be49457f4ae38cf19d9bdaea5726f278e968e05d92f6f3b99cc517ed50ef3879

    SHA512

    c317c335e3f78e49fb07800778be202724735bc9c87ea28632a7c11e6b479d42d6077f3172b6ab07598ea4d36287fe9dd744aea8912ddf5ea5e3f4417ce00e97

  • /data/data/com.transparentchrome_frame73/.global.com.transparentchrome_frame73

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.transparentchrome_frame73/.global.com.transparentchrome_frame73

    Filesize

    264B

    MD5

    a62570f8d78befb7d992862331ef95e8

    SHA1

    9fbab2d0af5d7da9e755003df1d2c791b6397fef

    SHA256

    9514978d529282dfbad12112459c8135e4eaafab1372c71cfa7b257cf9fb2c9a

    SHA512

    6cc4aac7a104ed70c1cf0268df0012c728747a20cd6bddb74a68b70f08232f0ddc4600e91a51b027dc4d1260a365118b1b5f328af67af58e8391f30593fb11e5

  • /data/data/com.transparentchrome_frame73/files/.o

    Filesize

    322KB

    MD5

    77dc50489b9323274732d27dc8a4e803

    SHA1

    0e02a3595b62489d0739d771881da8604d117c65

    SHA256

    c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820

    SHA512

    0684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58

  • /data/data/com.transparentchrome_frame73/oat/x86_64/[email protected]

    Filesize

    13KB

    MD5

    2979704ce2a935da441e06bfbca959e9

    SHA1

    24c8ff31f65d22c3bddec0f4b9405edb07220f0d

    SHA256

    02adbce4828e7ff545982b8391332be8f9e29e9a05a5740dd2b565ed5bd081e3

    SHA512

    7004700d0430c3653b6a5096c25798a74a0aded9238b46a87806b2ab3756c8e2505c0ea3da94fb2ec5e5b64968f8162722575e5439cf62d8382d85ca89a902dd

  • /data/user/0/com.transparentchrome_frame73/[email protected]

    Filesize

    526KB

    MD5

    b1283e948681281c54bf02cf3f4305a6

    SHA1

    b48aa5d9970a46479407ff6b5be5d84a40ec53c4

    SHA256

    1c53df00d4cf3033761f021a48061ec6584f7a7c9ed163b5eb4f6963d22bf87b

    SHA512

    47e12077f57a66d18f901a4274d45b5eb1e8162945772fd06fe0cba87518cb071c24a7dfb99da0b620f3b11904178f0dd6676c8338368a6a911724a86f3bc1ec