Analysis

  • max time kernel
    47s
  • max time network
    142s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    19-10-2024 22:11

General

  • Target

    817f2fb9d867dc6516a1a413c0887a732ee0d702f73aa93be16e5c3fed2a90cc.apk

  • Size

    2.1MB

  • MD5

    9a182858cb7067f00bb56fbc4e5605e1

  • SHA1

    a1adbdc635a3ce17d0f0a8e561a791a09286bb7a

  • SHA256

    817f2fb9d867dc6516a1a413c0887a732ee0d702f73aa93be16e5c3fed2a90cc

  • SHA512

    957f952265162039e9bcfb1882ee0c50eca4781c9c068b3cfb6602c7bcf9531be5abe865c2055bc5eae914089345891354504a6501d1e7fc617f2ee36a4c163a

  • SSDEEP

    49152:dA1TTyStath4oi4HgQDySYar60Rho9RtgqB4QQV9xPQPPFW6aY:dAJNtath4zkzWqHwRdB5QFwNW6v

Malware Config

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.wear.mind
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4249
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.wear.mind/app_present/OXisAq.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.wear.mind/app_present/oat/x86/OXisAq.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4275

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.wear.mind/app_present/OXisAq.json

    Filesize

    153KB

    MD5

    10d311dc34e58d7aba1e1bcf7c47f425

    SHA1

    836262aa78163acc9a09ed816d9682e9be4439dd

    SHA256

    2a3055d244c5e18d9a22e9ec93d04d97029c1d704436756b4a62c6b91c825497

    SHA512

    036bb657d77506d5ce141b26dc397596cf67f7c96b96c9217af4abfb83006ee918862101fd72e13bd712bfbd6176ce30d0c4e18d1ca035893f121ef74ce74501

  • /data/data/com.wear.mind/app_present/OXisAq.json

    Filesize

    153KB

    MD5

    b7fda7a09a5373e7b85c8e06600387af

    SHA1

    4baea9955900a7ae84555b4438c8bfd856196db4

    SHA256

    93fe5f4fa0facdd71670c6330ba4075c9268ee1be199b13a8ce662164bc9c87b

    SHA512

    4e5dfa36171f3de4d75b49311ebaabb10aeffe5977d9fd31ec4abcbbed0b6fbd6b177e36d7a4da1c9e4148d02118fea6d4582345fcc877c4887ac0df80742baf

  • /data/data/com.wear.mind/kl.txt

    Filesize

    84B

    MD5

    f0be6461fa2404af53134ab0e6020da8

    SHA1

    7167ba4724c24e00c3a7f45b13c38e6dad6afbd7

    SHA256

    ea0867d08493d9c71f0e40cf6b3a590b65cadace1bf2c37cae8d28dbd5687702

    SHA512

    5a713d0d0e7bf144b7b51fe1e0de9aa81f09b67d871f10551bfe1b64f7b2a9b3b546fb15b36a852f079a5757c9a9dd977aa643ce1e2784909683a4a8080b6c3f

  • /data/data/com.wear.mind/kl.txt

    Filesize

    68B

    MD5

    e1e6b4cf96f2778a91cfa01602384d06

    SHA1

    404c22618dcb4eccb13693361a0b1fc470843bd5

    SHA256

    39a5aed0e1edf832dc2b3b7684035cc3b0f0996f1f59e346f3fa579c5a05aef3

    SHA512

    1c646554c595b2a94b69ba9f3ea36fb4b97e967a4109d33f939899ebe2a07de5b25ec7a6c429a68eb6c7705be027919d8401d89b58041f7f6f480f68bc61da8d

  • /data/data/com.wear.mind/kl.txt

    Filesize

    45B

    MD5

    2858205fbd361dae152f3e8151928b60

    SHA1

    96e26dd56ceaa10ab1d9a4e5feb5aa820eebd358

    SHA256

    dbf2465d610f6de82dfcb606ade9a93c0e48d796e31ebaca2321dd059ac2f6a1

    SHA512

    5c63cc7542eb5a8567e9506e3db3ec250c2a97619e1002c1a46e304e9a44e4546d484a088c73f35c3202d2b304fcca4177cff319d213aa29de907dd68caac329

  • /data/data/com.wear.mind/kl.txt

    Filesize

    66B

    MD5

    007668ae663fb7f2ef85ebc33bc29911

    SHA1

    383e85d0b6f48d3c91931cbdb8a01c6195bfa7fb

    SHA256

    8a2144886891b7f92e12b785d39f5db5950332565adeb8b27e782fd25cb89486

    SHA512

    f37f2b4ea20f874252361ae84b0d00a398405f7c5e96faf9de7f4460c6e1884fd17ca0176eb91e545303927aa0c59413749fbf29a3cf131117a9316a04f46bc1

  • /data/data/com.wear.mind/kl.txt

    Filesize

    162B

    MD5

    c1c087947218b11ec69f8c8b13921f2b

    SHA1

    288985078ca2e29a61e81d82276487a994c1a5c9

    SHA256

    d28320bb71a63d25069ffd4f13a901248f627735dbc4440bf3aba693878af477

    SHA512

    fe620ac7c46736e5e8181bf8e4ccde429b2ec0a4c466a5c78f20cf910aa1ff400bab53964b1be15557afab598418f3525a360312c3bb1b6a10f2f20bd4faf856

  • /data/user/0/com.wear.mind/app_present/OXisAq.json

    Filesize

    451KB

    MD5

    8b9b129ae4bd125b2209f75f89af3b49

    SHA1

    349cd1402b2f6dd71fc69b0ccfca5985868c97a6

    SHA256

    9e24eec31844cab35b42dabf1fcde46ad8baec5b8a5e8a7c426cab845e215527

    SHA512

    e4a1fb66de160df40b3d8fd6df8be51528a4c7017e607643bd787e8e7807befe06dbdbead0042cf8ba3449c940a6fcb8fd38439549d14ac83e8893e202e04b5c

  • /data/user/0/com.wear.mind/app_present/OXisAq.json

    Filesize

    451KB

    MD5

    29b7f0ff248d3576aefa3ee23525d45d

    SHA1

    2abe5e2960ea960b950ac17ced05e0a0c59bc3e1

    SHA256

    6a3145b0a032433a661438af915e1217a86824940c936df286f6b86f2ee7a985

    SHA512

    c426f604e755370b54cacfcdd10b4997cd685db1e93979d487e9d0607a6d6b5c6e79494994de73c7e0005607f62bc82625e37c7cc53305271747e333214672c1