Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    15-10-2024 22:04

General

  • Target

    174d498536c26b83f30067e6064582e3d71cb40110f0736be01880c338632d08.apk

  • Size

    1.7MB

  • MD5

    743329d2ae56d50528317da8ab66aac7

  • SHA1

    26b740a2d06fdb97b0c94048c66de06194d5f894

  • SHA256

    174d498536c26b83f30067e6064582e3d71cb40110f0736be01880c338632d08

  • SHA512

    fc1d6b12eeed42312121758c9aa3e3d1c66d07235343f7adc3c4348bd900a12cabb6d61cf95a3ef6e18f55edacda146f83a397152312036f142042349f0dd532

  • SSDEEP

    49152:5e5/GO//jDuRDF6muprtDn8+Buy4Klb/ujFPOll6QEryB4:kGO//jSlhuXDnluy4qoN4kQEL

Malware Config

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.allow.prefer
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4309
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.allow.prefer/app_name/je.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.allow.prefer/app_name/oat/x86/je.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4334

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.allow.prefer/.qcom.allow.prefer

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.allow.prefer/app_name/je.json

    Filesize

    153KB

    MD5

    6df0f2707495a7c9c884dc7c49eac721

    SHA1

    ea293bfc7880d971bc8b3f7b9401d67538a3fbd4

    SHA256

    b25de261ca1b5e8169b1d85d83871f9dd7fbcef71c4961f7aa4ba133bf8ae0e3

    SHA512

    5c449a194100a7478c53e09c2ee64c4fea272fc0b1b74fcfcfe760a863dda327522f0722043b5673428f7765144a2b28af344c8bf11135d8b9163fe088349e38

  • /data/data/com.allow.prefer/app_name/je.json

    Filesize

    153KB

    MD5

    29c1f8aa0ccf9733839a7204c7dfa3c2

    SHA1

    e9fae8871edf579fd3b85ee3f59f382337dd25db

    SHA256

    956fd7ad787327bff97698a84db296458300956b5dba35df72c5c2ba5d0cd823

    SHA512

    b6d3c3f69721c1856fa47dbe4b47ee6be0a9b0aa78b3ef98666035475b8169b94cc2a6ecdc03918bc473a17578d4d669f1d21eb637e4c89e8eafe781f0e030b9

  • /data/data/com.allow.prefer/kl.txt

    Filesize

    63B

    MD5

    d6ded3641c883d046384ad727982aa5f

    SHA1

    d33b36cf5c1a91230292316728352fdf8cb8c929

    SHA256

    0553c7fddfb198d6fcfbbed41dec3a7fe97280b35bf4a3dc826f34e1466f8076

    SHA512

    d7acec68d2de9cf136b23003edce23178e5a52a15a34a85c3b86f261a475bb8707a465de81a6024180fd1565ba5fa4387ea5fe4346b22c08c0ca0dd98f5d1aae

  • /data/data/com.allow.prefer/kl.txt

    Filesize

    423B

    MD5

    0bfc6158ccdc62d2902c2887fd1f64f2

    SHA1

    c517b906c4fac8616a1028f2b6f70def370f0e96

    SHA256

    f3721073dee97408a2066962f228038257ef97f4ad320835265256529393a840

    SHA512

    41f40997407173d53ef320b5af9a69ab6145793bdb995401d6ddb311a5c78c29abb4ecc3421253a611a18f7033e2dcb84486baa7eaa18212627aa1f9eb252781

  • /data/data/com.allow.prefer/kl.txt

    Filesize

    230B

    MD5

    6125d8c68297b476dfabbc229a78c1da

    SHA1

    6166d0b28ea1a7492d90a227107a0ecd76f59200

    SHA256

    23fafa52f773a5b7f52db68dad313bba0225f24d52a7a5c734e17a7c8478dc52

    SHA512

    ec75ab0175e71d48a228da426c5495098b3a6de2d71b8cff86ab9a4c089623aaf177764e356c6edbee63b2ec78bbd110cda503ccfe5e8d63dbce9f803fced6e2

  • /data/data/com.allow.prefer/kl.txt

    Filesize

    54B

    MD5

    36334e17f71f37ffc15f77da480d9bf5

    SHA1

    5bb549683ca0f8e9042f6c21cfffae55a3ce7a1d

    SHA256

    5076a2576ca08a5cce5134d4b55d20473c6a2eac35d30180cfb870fab99df96c

    SHA512

    e8e3d0a6c89514ff76249f6a06f4d08c4786923706d438a2bd5edc8b3d249053bfe891643e3e0a8d444046028580fd272ebd1cf5b1839eb64201fd4d74535583

  • /data/data/com.allow.prefer/kl.txt

    Filesize

    68B

    MD5

    5a6f29285d4eecbf4a1c713988d69fbf

    SHA1

    96e8a1bcdfe8fc1c64a64f627066ee03b2fe48bc

    SHA256

    c23da40362b31081d0811cd3b51fb5e1ab6d64acd0f6ba6d748ddcc7a64dd414

    SHA512

    25c16acf3cadc8999570c8b77d4aefcf08bd2ea84dc8f7d07e9fc9346bf0870f366964b1b893f7126214c1e31bb780c3c214daf53fe3c422a2c118ef792ea761

  • /data/user/0/com.allow.prefer/app_name/je.json

    Filesize

    451KB

    MD5

    c5c547f9a9771f1b29f3baadaaf375aa

    SHA1

    d8293a495a8d45ca42bb54513b765a93db059051

    SHA256

    30a56a3a6804d7a8292530cd0b5002e45076d1ba0576eefa07eebf3ac8037f94

    SHA512

    b3dbac899747332b8fdba6d5ee48e99fff1f86ea87df07127e5943ae8ae7fa4164cf1e1f90f75baf078bbe4a43dfb9956e6851b4a85f3debca9efc5965de7167

  • /data/user/0/com.allow.prefer/app_name/je.json

    Filesize

    451KB

    MD5

    438282b69a8a79d49df87f67f50aca4b

    SHA1

    5604c89ed7263425bf98465cffd5b8132b2bd894

    SHA256

    6cbbdec47aef18f8ec5c2ea8c5e9a8f93a3b88e43d3aac0e8c988e99853a10bc

    SHA512

    7bdb6eb0673ff141b0f30e2d24b0b46cecad273eeccf7724057369a81bf06f735e4d754a48e1cdcbb85b6d8c76eb76c893afd79d23d8ad8ea5eeabcad59697e4