Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    19/10/2024, 22:14

General

  • Target

    17e77a713a8bade156cf07561156c5515e7027c07ae902feaffcba0a1d23abaf.apk

  • Size

    1.9MB

  • MD5

    cd8a7c85e961c40d942582e0219d71dc

  • SHA1

    1af2395f00b7c4a638d25527f84e180846df5499

  • SHA256

    17e77a713a8bade156cf07561156c5515e7027c07ae902feaffcba0a1d23abaf

  • SHA512

    f1ff54fe99ce3a7a73fe081f20a6ea238865784afc7ed8b6b35639de7efc26f38e625ea2545f6f35e8659dfc3742128b91fd63e17e939f5d6572525e13cfe9b0

  • SSDEEP

    49152:EFsieKTDR1rL8npKrP4XcxkS03IQREe8nULSKuniC4bVcB2PEnIqiYfKvtSxc:WeKHR1rLcKDIcxkXrun0VcB2WIqiztS+

Malware Config

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://yapayzekaveteknologigirisimi.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimveyazilimharikasi.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimveyapayzekatavsiyesi.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptofinansuzmani.xyz/YjdkMWRjNTllNzZi/

https://yapayzekavegelecekteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojilerevesimulasyon.xyz/YjdkMWRjNTllNzZi/

https://sibertezvebilisimdunyasiprojeleri.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyavebilisimyenilikleri.xyz/YjdkMWRjNTllNzZi/

https://uzayteknolojisiveyapayzekakesfi.xyz/YjdkMWRjNTllNzZi/

https://akillirobotiksistemlerveotomat.xyz/YjdkMWRjNTllNzZi/

https://dijitaldunyabilgimimariprogrami.xyz/YjdkMWRjNTllNzZi/

https://kriptoekonomivetrendbilisim.xyz/YjdkMWRjNTllNzZi/

https://dijitaldonanimvebilisimproje.xyz/YjdkMWRjNTllNzZi/

https://kapsamdijitalanalizveveriharitasi.xyz/YjdkMWRjNTllNzZi/

https://akilliveriyonetimiplatformuve.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaileakillialtyapi.xyz/YjdkMWRjNTllNzZi/

https://uzakgelecekbilisimplatformuve.xyz/YjdkMWRjNTllNzZi/

https://kriptoalgoritmaozeldanisman.xyz/YjdkMWRjNTllNzZi/

https://endustri4veakillifabrikalar.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimkapsamdijitaldonanim.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.infant.mesh
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4217
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.infant.mesh/app_negative/YEELSG.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.infant.mesh/app_negative/oat/x86/YEELSG.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4242

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.infant.mesh/.qcom.infant.mesh

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.infant.mesh/app_negative/YEELSG.json

    Filesize

    153KB

    MD5

    d14ea5573736adddb96a83f3b90bfc67

    SHA1

    05c91a77b40caa837ca1849c19b6e71c3ea2f987

    SHA256

    286aead38991d32065ff9e528486b8c309d0f4338743ece2e1d234fe3e55909e

    SHA512

    180d6400ed5670747f58ff4ff6887504c6edfcbdbce9b7005211f2f1eac17b8ffa33b90e8e65b4320a1076061e012422146d23a1210e85daf8abf19799d890d1

  • /data/data/com.infant.mesh/app_negative/YEELSG.json

    Filesize

    153KB

    MD5

    fbb1dbf6ec4304f0146eb3e2e9ea1c68

    SHA1

    82429970edf8d686ac92fec5d060f4e23fe6c071

    SHA256

    ffc7dcb548445b835de9e7b6b2286c7e009322f1343b8d500ca8e7a6a8fd5b48

    SHA512

    57e8f0f6c1e0237c63fac0146ad111c8ebe8c895196f87de70713ea412c8aa79c17cca9add509731ada2c910ebca0f22eb44262e835b21c2dbcd9e0646a5ce39

  • /data/data/com.infant.mesh/kl.txt

    Filesize

    45B

    MD5

    7c7ffd281f822ff2e53ce8264a56b597

    SHA1

    857d4c2e865acaaa820c08869567cfda923b7a32

    SHA256

    c8feae5d39c9f843aa9a00b8c55d9d1b2869331867f814464dfe0acddacb38dd

    SHA512

    edf3a4339abf621e1156507d30277d3d3adb5ea4f8f5f63380f228a5f5b1f63d9370233845afe4a6caced8a766efbf04fe83571da15337a05b42a0428bdef34a

  • /data/data/com.infant.mesh/kl.txt

    Filesize

    423B

    MD5

    104cac20869255c102e5e47e4307778e

    SHA1

    b0920ca19723e031bca32a7d975e01c1ccdc80c5

    SHA256

    62d32046e80ad795671a3ea06736ed807fed5c4739cc49f3a0caae5b1bfed838

    SHA512

    441cb45f6fbb0f84f8472227338ba8773e6d2a9cfdcabf3f4798af0aae464197a1fcde26f1036222d7a624128de846809d54a6a1d4fba158cbc529abb49e77aa

  • /data/data/com.infant.mesh/kl.txt

    Filesize

    230B

    MD5

    781f865a4498ee97e36e44bb4e9b102d

    SHA1

    e76f648cb65da0e522bcf63a42a2e40cd98f2c53

    SHA256

    9a3f521257be1825aef290d4527d96f1b1b6ecdbdd96b6907fb5f44b23c56980

    SHA512

    89673362f278f401b4c72760ea656c22a6b7bd83e4995c0250695c25a0ea068c556623d7acda891edf3fa3be943520e5842c99df0f6aa840581ac49a7a7c21d0

  • /data/data/com.infant.mesh/kl.txt

    Filesize

    54B

    MD5

    f0a81f338d5c5363d51a28f7db278d72

    SHA1

    37f4a525599e53c4282933406a5dc0c81272d52c

    SHA256

    a0f076c4df1e8fcb71d5021646f5ff2d303d872af8b55816fb9e433a051cec42

    SHA512

    c30e73a1dafa41919d6f461da83827b7842c6d7158376013ef55e24ac00af24de09ce0278b83d7d46308be22d5c2fd554c9d4f1e52ff7fd7817104566c9e8974

  • /data/data/com.infant.mesh/kl.txt

    Filesize

    63B

    MD5

    cd7341ce87e160c99c4b38bbb3e0f72b

    SHA1

    c719220de04a385b179bdc28523b22ce635c5a88

    SHA256

    0473e1cc14a3c23fa8169b9da90bfdbb213bc9c27514f8bb399b3727ac226608

    SHA512

    ab4ff121bb28fd0e6367b7b6c9c45abd30029746d908e7ad521c603abcdecd2e4ef53ba26589addc08073b690c37cad2b57fc7f147db38b215840ddbbc7cb73b

  • /data/user/0/com.infant.mesh/app_negative/YEELSG.json

    Filesize

    451KB

    MD5

    18efa85f820bd674e71120289cc2ccc5

    SHA1

    f1a7c05d463ca81541e49ccc82b8ab185b8fe210

    SHA256

    6aad703e73708f9420b5a250974e6517a3c2a1415b33eef14f115d229801653b

    SHA512

    e885ad9a65244842ba65f44b3f40e033464269bfbfe47a720e5b9272125e3018408d20a06722f86842698b3713a7b23a6c299c2e1a6dd7e31c6212cf13800dba

  • /data/user/0/com.infant.mesh/app_negative/YEELSG.json

    Filesize

    451KB

    MD5

    5cf448d9d7f34fab1ca944b4237ef021

    SHA1

    87e09d84d06a3afcb3aaccdfb504ff1d0f6d36e4

    SHA256

    dda767b4579a514bc12445771366d37c7d256c6081c56782b498d99e09833d31

    SHA512

    7972bcecab9befd0bde3da6cec52dfe92b8bf2ae968116e9abfe5283e9711824788518af80986649bd824e963ce422dbfd42888e40313ad8c0fb5941f142c6ea