Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    13-10-2024 22:00

General

  • Target

    4c87f2bd830dafb856fe6c59b8c6fa55f6e0536f421de00e4187daef0175212a.apk

  • Size

    561KB

  • MD5

    daf3d547d3bb5e307e060b25fa40f589

  • SHA1

    280014bcca09c1414b96f989967158a1ccb8828a

  • SHA256

    4c87f2bd830dafb856fe6c59b8c6fa55f6e0536f421de00e4187daef0175212a

  • SHA512

    80f92b1d3a2e53f8d484abfcbf925ac96a5d3f6478d1f7aec0bdf48eecc362050f1bdec43b15aac44e3d3646aa6af424ac8ff37f801c0ae8db4dfe4e4e015643

  • SSDEEP

    12288:dOtZzkeE0sh/3Q7+/zfAtMlSgFarTXi6n7XjIZnNmOEqX0R7nT:dOtZzkVFGIzfAtMlSXy6zjIrmOE02nT

Malware Config

Extracted

Family

octo

C2

https://94.141.120.53/ZGZmNzZhNzQ1M2Iz/

https://marketingshops52.com/ZGZmNzZhNzQ1M2Iz/

https://marketingshops62.com/ZGZmNzZhNzQ1M2Iz/

rc4.plain

Extracted

Family

octo

C2

https://94.141.120.53/ZGZmNzZhNzQ1M2Iz/

https://marketingshops52.com/ZGZmNzZhNzQ1M2Iz/

https://marketingshops62.com/ZGZmNzZhNzQ1M2Iz/

https://www.1getprivatefield.com/ZGZmNzZhNzQ1M2Iz/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.evergroundbdz
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4346

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.evergroundbdz/.qcom.evergroundbdz

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.evergroundbdz/.qcom.evergroundbdz

    Filesize

    88B

    MD5

    9af9307b6830f44aaa684d2a9c54070d

    SHA1

    1033e0b12a98b6b4f2b1f0193d78dd31cd359868

    SHA256

    7a14be43e47972b66c53688eb19f5c1a352ada642dbe601111425d9a6f934d57

    SHA512

    f82b4534e35abc3404f94f6ebe774ac487afe359c61226a4312ddd409ee6834942cb9f2b51146716f700bfb4011ceed5d56782059c0724e4d3fa4eb8337aca3c

  • /data/data/com.evergroundbdz/cache/oat/pxbxbyypjbcfls.cur.prof

    Filesize

    386B

    MD5

    8423e74bf94d940d8594d35f7edb3748

    SHA1

    d9aaebd0b9408d3541117e2570c458b345fd200a

    SHA256

    a4cd777c33288360b136543c6682c9110cdc0064894ed0d93ae085b01b9e3d70

    SHA512

    38f4d9dc44af9cb2d1a2f9f242f86df839b4ebacd534275df223751acaf420e32e36b4efa9b34acd3c24152348e5497a19e4aac406c706b83504e3e6f3c25d8b

  • /data/data/com.evergroundbdz/cache/pxbxbyypjbcfls

    Filesize

    448KB

    MD5

    11fa85d012a8e954d1237a672a4c8846

    SHA1

    2d4f18812ce5ce8cecb89fd10487e24e4156a867

    SHA256

    2f9c420dc001c584d9456a74e5437835bc3c25ed1421650f7684b9a6c19e367f

    SHA512

    e004b2e2b3c17cf53bfdf3c968e087c415ef4523f79f5db7f8350ff21140895afacfa9061bb58293c9bd0debf845283032e9bf16ad638a384167ae175fbd9f36