Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    16-10-2024 22:00

General

  • Target

    8a995deb2308159eabca2759db40a0b977fae8e26e61da14a8f553d92544b528.apk

  • Size

    2.3MB

  • MD5

    238c82ca94015ccdf78d10e22865dc11

  • SHA1

    f6aa4d57b6ee73856205447024128b6b12d4752e

  • SHA256

    8a995deb2308159eabca2759db40a0b977fae8e26e61da14a8f553d92544b528

  • SHA512

    51311cbc4869151e0b27842b78a0e4a254480e88cbd0a004f05ac9cd6f9b52e0297e742ce81278708db2527053349a05bb1357ddaad0ffee1056fbe6d1913928

  • SSDEEP

    49152:sRHDccQBQ9ncIjLNvZlgRmAPykxW3F4LgoZ7IX0Z:sRjcdQ9ncIFvnamAPL6CgoZM8

Malware Config

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.leisure.cave
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4579

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.leisure.cave/.qcom.leisure.cave

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.leisure.cave/app_case/SeZRC.json

    Filesize

    153KB

    MD5

    536d1e14d035c91df3c41defb482f5e1

    SHA1

    fbebe74f0b05d00c041b3726224412e8e6c830f7

    SHA256

    c327c0fe0180d72b728b144d82e4239d5d11613c5c9661c0a90dce96bfe815cd

    SHA512

    a14803b3b03070f02c671b37a73592cee87a75282840ad8da34a83349de3b5aadf3e37f5de4d3f6513c2715f9b36497f7f1ad5a758da4e167ec34987bf6b81ae

  • /data/data/com.leisure.cave/app_case/SeZRC.json

    Filesize

    153KB

    MD5

    b6cbdf22d3908dd28358cc248e412502

    SHA1

    b85d64fe779a9a778bb5778ab685845b60fbf814

    SHA256

    7ad5b6dc23c4df59b139a8f3d27a936957e9c5a852b9f07ed35fe782f6f683d2

    SHA512

    a4cec1b6089ca8b2e28a3f18fe7981db3493b97baab4d20e0a2449548cac8e9b4d13fc293fa67a30faaacc09b9b8f18c0beb7c102d1099a0bffd7ee676e0b895

  • /data/data/com.leisure.cave/kl.txt

    Filesize

    230B

    MD5

    6edd0510259b889fb2b63c1e8a589c10

    SHA1

    0753e59e4a7fd157b1c534f0043bc44d869b14d4

    SHA256

    d8ceab195b98c22f27ca5569d9486142b03d750e62864f0f95b7b892e9f01b8f

    SHA512

    4da0dd6f3e109a0a9e649fc19ba3f7fd211f256938b8d6ba2e777735733296b6a387bea617c6e7c19aece077da6222b848bd2d8539dd789644d0ea8577305593

  • /data/data/com.leisure.cave/kl.txt

    Filesize

    63B

    MD5

    0771f215f6fd29e194c09a7d05b1f22c

    SHA1

    de447267e4ffd087d41f4f38c07c2b704e3ff3eb

    SHA256

    21ce99ac396d9d2f2450ae4571d33998708ab6efc6d3444dc3ba18df572969ab

    SHA512

    78a5e8264d6be5451433fd1ac210c999a6c401e43f77d067cfb26a48dfe84207d882e740740c56de7eaf89360222b413f9f709831a6527e206590869bd0cd940

  • /data/data/com.leisure.cave/kl.txt

    Filesize

    68B

    MD5

    f4460f88bad9783a594818f551094479

    SHA1

    04448e643a0fb8f4409309a9c459f9b43091aa3d

    SHA256

    814f88969e23b6bea67f21c82dcf5daf6c2dd8e285b45a42e41531f3c60b1fbf

    SHA512

    c6a6b523f7dff49bc9acd1c14b1271a79cdfe05f8418bcb65ffb400f1c91e6373e1003610680e3745a102ad2a237fdc9e6e1e7c78dd6fdab0e417a3145c1ca0f

  • /data/data/com.leisure.cave/kl.txt

    Filesize

    45B

    MD5

    39f50e95913959954c79a7fd14b02b7b

    SHA1

    b72241274c0445bc1570bfe3e11cd08de21bb22c

    SHA256

    6afe3e49df13a28be5e32c33d2f28d42d4b59b45bc6af1fe7b08c19c212430a9

    SHA512

    2b24bf7dab2a755a4bf0e6206be89fa445f3a401d21ace615584e03db00d651083be84744f0cdd79735af78d7f009b1216b45b5a8699cb16717191ecbc65f145

  • /data/data/com.leisure.cave/kl.txt

    Filesize

    466B

    MD5

    a22c287be4737544f004096ce7bcd2f2

    SHA1

    6a1d2803278bfb37e2b5a968823cd888aa8a9310

    SHA256

    4e9322dd3406e4bc0a7160ec77ee3f93fe12bfd92bd82e924bc6b9ad33cf425a

    SHA512

    3552c3c20b14c790a630c715ca781dd689958a7c03b3c1169782d935ac968a0eeaa68c3dbc77744b892953539e5bfb233816f742355894df765de4f4ba935929

  • /data/user/0/com.leisure.cave/app_case/SeZRC.json

    Filesize

    451KB

    MD5

    369f49ca3311f3b81e56713c5a33b459

    SHA1

    924de43f903f8c4fc7066d04109cda44fd19931d

    SHA256

    e9b9fc6033587c29a3170dceaf67e0cb275b0c837402bf14caff4b2ce53d477b

    SHA512

    74751580b2fa642ef93148e6d6f4715cb290570052b02092d191d3ffd0933cc66c3ee886a46b55b063cffffde437c424a6f92678f3c1b536da60ddcd2117ab6e