Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    13-10-2024 22:04

General

  • Target

    ef55acea2141ef4884d2cf601bc526e7c5d6a8b2308bb10f6e68db2f6c01df97.apk

  • Size

    1.8MB

  • MD5

    2b4b34a62849cad691d254f7883b5796

  • SHA1

    f1fecf03227a49d71ac5242d2ff79d7e9abe1bd7

  • SHA256

    ef55acea2141ef4884d2cf601bc526e7c5d6a8b2308bb10f6e68db2f6c01df97

  • SHA512

    d30f7aaf728cfab6bdbde9e296551028a4e5be3eb0df4425a60a23278e2d9cdb799d4ca2049bf1f1569feed651439502a2ee8f9770037cadad0c2010a4780f3b

  • SSDEEP

    49152:jOI3GOVKWdKbM+Se/3blxYx0SB3SdL8BzD9O:ptHdKbNVSB9B3s

Malware Config

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.coral.nasty
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4260
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.coral.nasty/app_general/BiICcHu.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.coral.nasty/app_general/oat/x86/BiICcHu.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4287

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.coral.nasty/.qcom.coral.nasty

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.coral.nasty/app_general/BiICcHu.json

    Filesize

    153KB

    MD5

    d8da1cbcfb719b307f2e224e712f7ed4

    SHA1

    247eb0a5489c5ca46901d10ed15e6c688a5ba552

    SHA256

    fdb9571be9c451e96455fb5a801460a780b5e90cef9cc360021c4a8bc47b23ce

    SHA512

    d80894232f7bf07ad4fb4fec2382f39932a8f1da69b7ef93c2b350400044ddd963c404ca85dc19f2a69cf0e56ae125aa58d0d6e545f731ce8df05689c93657df

  • /data/data/com.coral.nasty/app_general/BiICcHu.json

    Filesize

    153KB

    MD5

    03324e5c43c7d3563a09e913788b2fbd

    SHA1

    9572b6b215b398ca5389aa754697b41bf2d015de

    SHA256

    3455e66fa4d002b0e3c32fee2cfed88eb634f0795715406770cfd4e175460543

    SHA512

    9f04e0ea48c90bb57a45b844f277d872cbc5f32ee98ebf8628b074df190ef035b708ab6a1cc3195b75868908573bd599471428eab8aead4513fc8fe2b676fc79

  • /data/data/com.coral.nasty/kl.txt

    Filesize

    63B

    MD5

    4387f45eb3d62ebdf296a9acf3d18655

    SHA1

    014738fec37a1f2f1bda7baa0c153a6a47f49130

    SHA256

    ab8652aae63da46f6783e939bd83a26dce1ce90c6cb8e45f7759fb2282c8e0de

    SHA512

    8b7d9d2be6a2b57952e6a21bdefc4e4844fc6cb2c7fa8cf3d3cde1b58317ee3c0dd712986f339a6a88a1ab5dfacc6d622100e8418828bd30ab3db08ff1cf78a6

  • /data/data/com.coral.nasty/kl.txt

    Filesize

    423B

    MD5

    e15060740b7251a1206016fcc0119350

    SHA1

    7dae81e5cabf40716f074c3ff5548379947b7438

    SHA256

    2bf3327c0dc5f015d28c4d3baaddf355a226efd06e141b0ecf4807d0601b0df1

    SHA512

    0f7d4ce71628fddff4c8465350d7e758a1a70520937752a0f4787b997645fe01e086b5c74be9936455b3fb317f6ba7956f5b3e54dfaf9ef96018324ab793834d

  • /data/data/com.coral.nasty/kl.txt

    Filesize

    230B

    MD5

    9eac7115271a91a8ef145be69c445cf5

    SHA1

    d16dd88410809f8fbb2162b5045fdf18a0c1f0b5

    SHA256

    5e4115652093d3da5a2c32a77f07f353f8fa46c038136f88c8348a2f416f6893

    SHA512

    a08a875c0ff1023c0efd271cb17bc62f7c14c4e2da6aaa9c50d4a95ac3f6f891fdbef7acef281f636d1b7487e29971bb2c5aa3974d7778f216f942ef1e588a5c

  • /data/data/com.coral.nasty/kl.txt

    Filesize

    54B

    MD5

    5ab781d48bff340de36739a2043aede9

    SHA1

    b63bb32ed69657d2d75b82bb53a01b6df32a8296

    SHA256

    3bd0c05be1e5c091ce98c9d43f7987401c3959b7c7a54d291e546773f8a52590

    SHA512

    3c495f5d188854f3b9f9c79b414c3413c8499996a7b487fe54e8ba5f694b9cac538e07089c2829b9e0428bf3253b3b842628fab2b253656380e4cd00ff1823a7

  • /data/data/com.coral.nasty/kl.txt

    Filesize

    68B

    MD5

    5519c376b3bf139ce677442ebe371971

    SHA1

    7ad6c6cc8cbe00c4db1b1f65cd4d1603e366252d

    SHA256

    8302c356693967b24cdcf30c84c91cb9365bfe32f3a664e6375a8a26ad332ec4

    SHA512

    419f917784a8e7e9e6e3f26fe80eeb7c8be3dc0d277c5b2897794b2b9e9a5ed0b13df0d0c917589d4520eeeb5351cd0788c2b60957ce3f8a2bbd3c69ff1f53d8

  • /data/user/0/com.coral.nasty/app_general/BiICcHu.json

    Filesize

    451KB

    MD5

    e33bafe3fec1fbd5b2857c61a5ec6d9e

    SHA1

    01b6a3fda1f6c15b23c65a026410e6b1c30d8eea

    SHA256

    906dc2f741c350276115e1c88a7dd011220887a7fb4892c22e338775df72eb92

    SHA512

    8dbdaac2bd14ae61a7e1f62e70c1caf85bc0d84bcbbe9091351c16941a4f80f15ead652d17d2ac6418bc6a42a81293103d746320c2aa6fda60bb3fe2dfc2f12d

  • /data/user/0/com.coral.nasty/app_general/BiICcHu.json

    Filesize

    451KB

    MD5

    33aeb09ff83a611e09828a8b233e2836

    SHA1

    b1addfcec8a0a85da02659b79af2cba489a05381

    SHA256

    7929e7935f2d9631ea4e9ad7c5f9b9cab62d5972fe8749e0b9a70c055bafbdfd

    SHA512

    51aa169a92298be60693bc8c766a9bfa1889ad72cb6409b29cb25e9218c907112e270ca12cd51093c06e161e74d6c0f3c78d9f436644415ea05805e7a8494dd4