Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    12-10-2024 22:03

General

  • Target

    748f9575ca09149b8d50a5c59990daac9a403d2ebbed61d403091a8e65a7c306.apk

  • Size

    509KB

  • MD5

    9729ca02e262478aa5623b0f9eae655e

  • SHA1

    48802719b5a464f72a3636db5e4cab900f65d25a

  • SHA256

    748f9575ca09149b8d50a5c59990daac9a403d2ebbed61d403091a8e65a7c306

  • SHA512

    dcc889ac2357e5847d8b2ec3b6d3ac311b209744ab5f5e120668d36a86711a5630959b7bb0784c4bbd4596b24ee4ebd5447104f98d4ede4c0b052141821d2cb4

  • SSDEEP

    12288:1G6PmLUrXRvJS3vp7+/RLOaVdp0rxyVuhh0ur9nqx:1PgIXRav1+/mrEVuhh0Mns

Malware Config

Extracted

Family

octo

C2

https://kesmecekarpuz.site/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz.com/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz145.com/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz878.com/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz5446.com/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz8455.com/NGE2Y2RjYjdmYjg3/

rc4.plain

Extracted

Family

octo

C2

https://kesmecekarpuz.site/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz.com/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz145.com/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz878.com/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz5446.com/NGE2Y2RjYjdmYjg3/

https://kesmecekarpuz8455.com/NGE2Y2RjYjdmYjg3/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.wholepointqlj
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4332

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.wholepointqlj/cache/duermxsmj

    Filesize

    448KB

    MD5

    4db0741daa78bdb78f5a227d1e290a4e

    SHA1

    b357107b30e40813e0c96432065dd69fa3504e69

    SHA256

    ed5c483bf900f130ff7c1905c48d6b7394965e7c1bbbc62c05bebf6dfa55a6c2

    SHA512

    8fb3289e4f39b1bb17cdbf783b7661e60cbf2db56ccbe25392e84e3127d5d3c6752b060c1842ef8d8c1623a6173b4cdb46c9e38cbf3f180544709cda27f40eb6

  • /data/data/com.wholepointqlj/cache/oat/duermxsmj.cur.prof

    Filesize

    461B

    MD5

    0c54a0deec4c3d0a67f87491d6a45690

    SHA1

    541963e19a8e5a040848d4e1e1d3c4bee9aebb02

    SHA256

    2cc188e75b7b8d839d346b2b2be703156619bc549b267ca8dfdeb9154bb22d07

    SHA512

    cdc4f26a71276ba70a1c4c6bf91d1fb425c97080c90089449b794aba6f454e5559030455f296e7c490f375b8020ca60c0f4045a50981d5d3a3ff38f5dbbb0e91