Analysis

  • max time kernel
    40s
  • max time network
    157s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    16-10-2024 22:00

General

  • Target

    0c4cb8a3ed02fc4cc6ef3ef29c55f38a775db104b1b6490a8e9936832abec777.apk

  • Size

    2.0MB

  • MD5

    ca8b01ac56ef5217619b505714884faa

  • SHA1

    e9042a98d1c600b2ae652db1f74ea12aa387cdba

  • SHA256

    0c4cb8a3ed02fc4cc6ef3ef29c55f38a775db104b1b6490a8e9936832abec777

  • SHA512

    f7c877f9cb123a958446a67c777ad94b8d67a5caea0234fea2ff0a291e6bbbe09f1c43c57964238ae192bdf6d253e5960f104d8959d44e477498d7c4296be85c

  • SSDEEP

    49152:QRCMvQJjQaKYfgiaZUdzcsYHdtnSw+QaaCE7Yhw09GPZLZjUg2TRn5mkHnvvv:QRCuQJjGvDnSwGFROntjUgkx5lnv

Malware Config

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.spin.tree
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4313
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.spin.tree/app_diamond/KOBx.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.spin.tree/app_diamond/oat/x86/KOBx.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4340

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.spin.tree/app_diamond/KOBx.json

    Filesize

    153KB

    MD5

    bbcd09d5f66ba0af8b70c4bfef5a5cf2

    SHA1

    c5ac563faf96891ab217fe7060f995cd189c19e5

    SHA256

    b8e0b06210ba0b2ea6afa277884750a52bc99bf9286284652a8042f8e57f5fe8

    SHA512

    52b1e960041aad25de674e88a78609f7ea6f39a88cc23067a31472da025800815c0c7dce22a04ce371a270062944164a6830780874af9fd40b38f527293db808

  • /data/data/com.spin.tree/app_diamond/KOBx.json

    Filesize

    153KB

    MD5

    6acf1b723e66a367946100ba1a14077a

    SHA1

    fc1a8078bc3612b4d1ef52c80623aa64d53dd390

    SHA256

    a1ebffef705d08af4de70381e5790f0dd4743403fd215ab841b6f7474a759c0f

    SHA512

    5ad33060207801de8e0b2388a896779c3a9256e5576d7e7ede0f9b717573833a1499c7de7293f6203ca099e806737e85e9d877b5e488c7f56350bf763a651166

  • /data/data/com.spin.tree/kl.txt

    Filesize

    79B

    MD5

    03b63cef7fe2bbdba1d2e24f7c010cd4

    SHA1

    c06cec374aa2a4cf01610a5e8dbe64c800261551

    SHA256

    7aad5bca26c7eddf5b41979ca004a850510a79bb4e1cfc0ea3d6e2d29c7fa3ce

    SHA512

    7cdac787f74782723af2b4e365f4979cc2772d76eec6264c9c21c7ba25904c29ea62db5daa699824d79e5662386b2170ae3272e89225dd16e30047a78a8cca12

  • /data/data/com.spin.tree/kl.txt

    Filesize

    423B

    MD5

    009d9116a377cf421bdc1a1ca71898cd

    SHA1

    7cbf979a6d49194ee64edd734f819eba9ab70a64

    SHA256

    0629b5c9f41f2d4021d3bd3f6c1de754ada17b853bd6c3a2e23e849f39e5e9b4

    SHA512

    05260c6ca22024141c6b91668ac9b60e4e7d78745f8070873413f1c364d252ba9ce08166d84cbfa9bffcb60ba1721ba748a9920c59a72eedfbc62a6d3535f127

  • /data/data/com.spin.tree/kl.txt

    Filesize

    230B

    MD5

    2a61c87b94b768e58e68c50ac7249ada

    SHA1

    6ce7fec180cb34ced95f32a818aec641c97ec3dc

    SHA256

    ff2168baa15a24ded574391c94f38a122c98dbe3c14483f7dc14b4d8afcd3067

    SHA512

    b038b7dd3b2f48e8df4af0f7b8a866e57b8776a7f8f7244dedf6a1d5ac8be128e5a1c7fcab00446ee6ca760805b5e506bc86ebd8583cdcbf24d0abd387905f9f

  • /data/data/com.spin.tree/kl.txt

    Filesize

    54B

    MD5

    164083225de33132860cbfb8eaeb2d32

    SHA1

    2b15252400cf3b8042cc43d9bd4e4d257476402b

    SHA256

    77ee4d48e6356b52b9a4a54c39f685ac53855daaad7b92be3809390cac975e78

    SHA512

    d2e08875e609890b09c48ea8719fa5bf2d02b159c62b40b6784f07fe188f489253ead415be9a0daae1636a4319fe90129fff722707911f84492eee9f0c9b23a2

  • /data/data/com.spin.tree/kl.txt

    Filesize

    63B

    MD5

    958e2258c03f872db054c1b1ecbb8f11

    SHA1

    2109f95fc096c72255ad2c393a550e775745b53e

    SHA256

    c3ab854239d0078fbb900f22d7ee3bed28c1577e05042462084e977bd4ede330

    SHA512

    8d058e189417bc9b4ddc83c069b9da2115c13468f944079913e3e2f00588a6f186ae685a9264da008d1e5b6949f11d1d0f80840f856e29c89d3ec8144084a85a

  • /data/user/0/com.spin.tree/app_diamond/KOBx.json

    Filesize

    451KB

    MD5

    e700e36bbfa9266fed23a0f91961b763

    SHA1

    d8a0b0cd854a3ef29d00ba9cd40bc3ba1c0424a1

    SHA256

    835ba3149d2e3d8360603458ca1881cd58351a0b280503f51d8d62e701c53691

    SHA512

    044dd90a6ade19d5e9f7d6d2d2f620d275435ab59756ec845556c33791753be363e73492ad21ea8a151e782cd719943fdac3267250b6d411cee6a9fb35564785

  • /data/user/0/com.spin.tree/app_diamond/KOBx.json

    Filesize

    451KB

    MD5

    d197d07c8fb9889708e780d0fd8524ff

    SHA1

    e667e6e320648a69651a4fb155b4a9f89e31b401

    SHA256

    a5de2ecb61463eb9aec24e014580aa29d6c7622d1d542049a113d8a5bd54dc40

    SHA512

    5679f0904bf89c004d9fd8536400b462a6b7de7e45ffd29a7647c52f550205daf5b927ed6a8fade58fffb9808361b7711f120ca5c2c539903b5e940c9ac12231