Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    13-10-2024 22:02

General

  • Target

    d9c161e9bd72e4f1afb50b94beba4c7147026044d55dcfb3783bdcf9932ff4ad.apk

  • Size

    1.6MB

  • MD5

    6251cdc65952f9401660671999643929

  • SHA1

    d766e2d8af65d5e920ebbd8ce23cf892a161952f

  • SHA256

    d9c161e9bd72e4f1afb50b94beba4c7147026044d55dcfb3783bdcf9932ff4ad

  • SHA512

    befc249c7c54ea0fddb75a7bf8a3f5d7e922aa929bfdded9bccfd136496b462e12146757caee163f95984aad489604915df8f3765001121594c7624903839d40

  • SSDEEP

    24576:fXtPn0TjIxeCp/8xEpePMuk+lBLjVnz9qVfTjko6ZFS729Srg1Fig:fdPnJbp/8eCMuvlBfVnzwVsPtok1Fig

Malware Config

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.symptom.alpha
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4340
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.symptom.alpha/app_consider/TsnULD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.symptom.alpha/app_consider/oat/x86/TsnULD.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4364

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.symptom.alpha/.qcom.symptom.alpha

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.symptom.alpha/app_consider/TsnULD.json

    Filesize

    153KB

    MD5

    a2a09d5885dee19be0d1e54e86d7a61b

    SHA1

    c0a033c17ac70986d3295556c41e4b94aa9d93d7

    SHA256

    683e28472cb590c877647351c022b2f1155add6a29e4ce3daa4699482eea2028

    SHA512

    3271da2fe7e33c218832d6053409a3a76e031ea36a0c54314c892cdab7b143473832d332909ecf774fa459e5186b99935b081753c624cfea8027ee553f496d55

  • /data/data/com.symptom.alpha/app_consider/TsnULD.json

    Filesize

    153KB

    MD5

    9d3e7de0c810ae686a132041241bc784

    SHA1

    9da57e4ebb7763d6be9576490578676942c98824

    SHA256

    8abd2bb22a64b03f351d0fdaf6dec5679b906de64c723ae208d50e0b8e84605f

    SHA512

    6674daee85af3b0d58e5ce646dc3c0bac45371179ef3834025d14ff5659990b2711e8ff22ff8959361c5b3546f3d3349cbc528d821d43ecc3b7d9b1be79edad4

  • /data/data/com.symptom.alpha/kl.txt

    Filesize

    45B

    MD5

    93ccfd7f830f862da3dbc5cb095be2a0

    SHA1

    92fec345baf5ee2a7e8f773d64687f02487e504d

    SHA256

    42bcda9989816c864af44da82c726bf4fcd57b4f498f536d5584927618c0e448

    SHA512

    47f42310dca7c9a833d1e33cdb20869a08ad9bfd46f69c7211cc8560d6390493ecebca01fecb9bd7b35903f18546e1193bdf5d2f13145f78d59fc0b106b9a6aa

  • /data/data/com.symptom.alpha/kl.txt

    Filesize

    423B

    MD5

    dc4e5a45d69a4311ec30801323b33700

    SHA1

    49c8a801e5f278944b87a54e33ba3e56465288e5

    SHA256

    05c6d9e8bbcc25f02f06e5ca72d4798f59da574666e4ff3b77da383ff4bda23c

    SHA512

    16d5630ddffaa456e7f9821cbe4d5744aee4d1056ad7b90980c2221700452a77e9fd09c961a2d8b0bd467ecbb134f88f5725c7751119f185ecb42040f1bb8374

  • /data/data/com.symptom.alpha/kl.txt

    Filesize

    230B

    MD5

    6293df79e2b996b6ac3ac0c23ff79161

    SHA1

    0bb796664931237691049764653ac02030a22ebd

    SHA256

    3366f9c98777b8e31de0594d004eb5c133ef1ca37e4c51e1a6d0a065f83e1e51

    SHA512

    6ce4ddf59d9699bf869ffe49854fcdcb357fd5e310e1aa352f436bf5b41db2707322a6050ae6321a96742f1059f717943b8344a910d41e3b4db3235a1317080e

  • /data/data/com.symptom.alpha/kl.txt

    Filesize

    54B

    MD5

    6e240682c95c816f7f169eb67db15cb1

    SHA1

    e5d1b28838fa50fd088613d139eeab4822adf054

    SHA256

    538c344d9b3733f2404dd1aea9344a760943dbd75a3e64995aef0be85ed6ccb6

    SHA512

    4a7bc6237b8b57dbe27dc4da8a61f0bf109e03ff01d94417a1f4f2df93b8bf8512b4ee553106275dc282ee454e78f6d11a0ecbe040d7082ebe3319a5a2532615

  • /data/data/com.symptom.alpha/kl.txt

    Filesize

    63B

    MD5

    ed0d76a68b8125969fe0eb03da5ba57b

    SHA1

    b082102f21d8d65a4cd32ea133c288ff60c83ead

    SHA256

    d323bc8b4c7e437aea95884163f134903bc6f09eab5a43e10cd0b9027e797aa8

    SHA512

    8380018b580b6bde60ca4f49e9c35c2bac566c651a16aa4af060ee20cb2ec9afa50ec774061bdefd08ffa17a540943c25c8b2e99fbdfb65402f73d131c88a9df

  • /data/user/0/com.symptom.alpha/app_consider/TsnULD.json

    Filesize

    451KB

    MD5

    a381f57a8982627e72822ef5335bfa4e

    SHA1

    fd0fe440bc748ca51ad0b0344e76d1da11be434d

    SHA256

    b1b4ea71c413d25f19415f7f5dc961dd0039920a6fdfef8e61886339412dcbfc

    SHA512

    d51086ec96588c10936fe2107b7a6ca3722925ed0f800b0b3b951ad9d8eadaf8707708eb791cee17ee5149fc4b7d698395aa063c23ddd7c0cb023f7e120b00f8

  • /data/user/0/com.symptom.alpha/app_consider/TsnULD.json

    Filesize

    451KB

    MD5

    cb78e2240e5956a13616b9f520fdfdf9

    SHA1

    b251eccafedcf453303ec2b2db2d5cc095fe01ec

    SHA256

    03d145d516a282f47d2fecac789ba1661d98fb479dfee753cb9b8839ce2e4cd8

    SHA512

    2ec9afd8b87e70925e839339f9d630f532c49c98302a41f76edc1128cd5fbb87bd9580cedc20b6683d281d2e92ed4a157ae082751836b8dc93f271aeefa561dd