Analysis

  • max time kernel
    144s
  • max time network
    136s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    15-10-2024 22:08

General

  • Target

    1b939b3c43e34a28eaabf76d6f65a1a0458ecbd6a12692ca01ad199ae8e151cc.apk

  • Size

    2.4MB

  • MD5

    c02160b12066dcc567b516af3f3454dc

  • SHA1

    8f1ab34043ed6d904b524557d9b2eb796d6c0880

  • SHA256

    1b939b3c43e34a28eaabf76d6f65a1a0458ecbd6a12692ca01ad199ae8e151cc

  • SHA512

    89b7e1907b7bcceb2b7405ec3e65c06f929872c9682e2c767a35610faf6616d089b64c47369d29cb06987b868d78c83a391e42eb7276cf24ebaea50ace36fe65

  • SSDEEP

    49152:MIhUxkXk8DMQROa/zvT9jhBM5jHbG9mZzHhdHnC6EecRHqvuxQJHBOYE:MIUkXPDzMozvT99m2U/dHnCt+uKFBOYE

Malware Config

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.oppose.baby
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4255
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.oppose.baby/app_canyon/sqAd.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.oppose.baby/app_canyon/oat/x86/sqAd.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4280

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.oppose.baby/.qcom.oppose.baby

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.oppose.baby/app_canyon/sqAd.json

    Filesize

    153KB

    MD5

    9ae37e41f5a66f743e0cc26413350c3e

    SHA1

    e678cc24c0e62035831600772f49cb220fb9bb5a

    SHA256

    4a50d833f1c0c071e517e072a23ac878362991493cd8ba55928074690a5e3a6d

    SHA512

    a59d45f58d507decec33d36ba967861b65930cedee2fdbaac87a24b55a87a5c91d71b7e460eaa75cd8e4084ff63ea4d4c7dee86c65300acd51f9c2b321555eff

  • /data/data/com.oppose.baby/app_canyon/sqAd.json

    Filesize

    153KB

    MD5

    9a9a676698684457fe6902a4aa898945

    SHA1

    cd27c53adc4a06acdce933fae70f757896223767

    SHA256

    bdcc63cb5cd6f9bbfd5f1db0eb52c380c9af667614303f7e2aa0bad794ec88b4

    SHA512

    1c9f81e7ec73e87ca0369965dfd6b84255538b4a341a8cdec5ba8a84d1b9bccead60a3cbce10bc5ebd1de81ca6217e0e11ac6df3741af86224ae22848c187661

  • /data/data/com.oppose.baby/kl.txt

    Filesize

    45B

    MD5

    2e82d8a5b78ada1a3c5b6d0671023449

    SHA1

    e2931be7c592eda11228e512a81e199a896d49ac

    SHA256

    47097c1cd415e5122a0098e7afa9bf19f27f29cac9d0d111d3c15d4c2e7a7ee5

    SHA512

    4284f810a1bea3eb2cc05c54b6d5113e927f85402c4be21c43b8fb91f9e80083bc29964a6feb0e14ca7c3e3cd95f7ec86768f93c22c646dc13dda763dcec85f6

  • /data/data/com.oppose.baby/kl.txt

    Filesize

    423B

    MD5

    12d8896007b474f08572296956131396

    SHA1

    3ee8f527b7156f05f0e798d88a80220d2c9f551a

    SHA256

    f83c06116290c8e1a80d54b732a36164cb42939a7cfd4d37312c601b530fcc4c

    SHA512

    83d4da68d52912e4a7dd1f976a2ff3545da336fe6a3f85a19361b3ea6f163f2d5fa4cda0cd429cb7503c99d437d98411d684a05d5192f405a65e7604874ae5af

  • /data/data/com.oppose.baby/kl.txt

    Filesize

    230B

    MD5

    b76bf556dc18e61db03c2801257abfe5

    SHA1

    f6ee88e3a462dfb395ee4c9738b3e1618131319b

    SHA256

    b43c1e4926a1a9642c9371480de258cb5ac9c839fd0c94ce9f4d6c440b28b174

    SHA512

    a3d77216a27915576b83bd615bb480b367dd19767ebb4a5f582801439340095815b35429b33834d57c93d9ba4ff628f950fd9964c49eeaf549858830dcdd1ef2

  • /data/data/com.oppose.baby/kl.txt

    Filesize

    54B

    MD5

    204394fcbbcd7f7a520612d1805a2c00

    SHA1

    8957bd62bd50a5ae56a3f4ce740cd893b6edf64b

    SHA256

    d75ff3c137e70e3141ce949fbaf949b725d8b8c957e0369728234804ebca3ecf

    SHA512

    6129e780d15b52f77bb710bd6dfb800f402f09a894c9b1ce423b6d608a415d75f7237316197068291a57089810e1c7d7045e2945f2757dde16696312d0dd1550

  • /data/data/com.oppose.baby/kl.txt

    Filesize

    63B

    MD5

    8cf0549a3986420196346a4b57503c08

    SHA1

    2ad258d4072c18e9fbb10a230301c833d929acf5

    SHA256

    b92ab0598a8ab41a514b9cec4a70c74f042c66ef7775a801738c9ec7de523123

    SHA512

    b4c58dc502f0bf783012b3641709ba344490c10e71de52d0770f934a1bc22400c76773ec0cbd0e73b6075efbc59f4326ee53f69e80d952f8eb7a5bb0348719e5

  • /data/user/0/com.oppose.baby/app_canyon/sqAd.json

    Filesize

    451KB

    MD5

    bb655836bfe43dda3f418b2aacceee12

    SHA1

    3c9d3a18b0023656861f682147b268e30ef56314

    SHA256

    58a4d5c2cfcdfebc08be213fd0ab1675273f3c07cdc872f504ddd96a102dcb0f

    SHA512

    3161f96b93ac455bca3790530a1b2b1cc75f9a4acb9ea8c05d1eb4ad484bfcca270cd8211a7a5c6d72397064f453d5bd5c057a156d8b1aab3de23a727b558a1a

  • /data/user/0/com.oppose.baby/app_canyon/sqAd.json

    Filesize

    451KB

    MD5

    0b6931175b43e603486cbeb7bbd990b3

    SHA1

    ec8d43869705096aa6c4fa246634b37386f93ab9

    SHA256

    fe2d92f56e5e12a9c16f929d88b2aba6c5102cb9554f979fd41b75095d178af8

    SHA512

    e8abfe08137da460dfab354a9829a90e6462ee1846ee10829e61932d0dbf49d537aefaad147d2cb331f4abf597a8b248f66c5a6eed1b993bdaa83eee32cfcc2d