Analysis

  • max time kernel
    147s
  • max time network
    143s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    20-10-2024 22:01

General

  • Target

    f489d38d9e54e6abcc154b8a2b6f1b5a132b06a2a01173b48610d514d92bf79c.apk

  • Size

    561KB

  • MD5

    9d3d57f28fc9ccff34e4745dedc7e8dd

  • SHA1

    e2a219a9dfaa10a62f241a59610c4431bbb28111

  • SHA256

    f489d38d9e54e6abcc154b8a2b6f1b5a132b06a2a01173b48610d514d92bf79c

  • SHA512

    b6981ad580c54ae2875e0abfb531f98cea155fbc89567bbfe255c64109e73d33e77f3977f13da88a4ff1e2255892b452601c211d395d3ee25b02097f1cf1201e

  • SSDEEP

    12288:rbOvp0trgVeWOuOMuUtuX/JrL3zoxEMTp+WJJAbnV6:rbOvp0trGe0OM5uXJL3zyQisnM

Malware Config

Extracted

Family

octo

C2

https://yeyrekhospital.com/ZjUwYTMzYjliZDZk/

https://hamsiyunus342.com/ZjUwYTMzYjliZDZk/

https://mlbumlml2342r.com/ZjUwYTMzYjliZDZk/

https://cilginrtelfoncu3351.com/ZjUwYTMzYjliZDZk/

https://mlfkumal333.com/ZjUwYTMzYjliZDZk/

rc4.plain

Extracted

Family

octo

C2

https://yeyrekhospital.com/ZjUwYTMzYjliZDZk/

https://hamsiyunus342.com/ZjUwYTMzYjliZDZk/

https://mlbumlml2342r.com/ZjUwYTMzYjliZDZk/

https://cilginrtelfoncu3351.com/ZjUwYTMzYjliZDZk/

https://mlfkumal333.com/ZjUwYTMzYjliZDZk/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.butstood6
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4223

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.butstood6/.qcom.butstood6

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.butstood6/cache/gypdlraftyr

    Filesize

    449KB

    MD5

    82bf904b9cbb4ca3bc05b668450bf745

    SHA1

    dd2b6c5f5b9a104827dcda2a9a6b37b31c6d325f

    SHA256

    66daaf47a3568ef04a5a5bbf621b60c5d0cf5771f0856908e59e6ae69c58fd80

    SHA512

    0bdf7daf127051e5112692a0f0f231b3d72f54b0fb7b8e25b797f913841487df5e485d3d288f9b876f3fa68ac92da8bd972aa627aac0cf826b65eeb16a9d84be

  • /data/data/com.butstood6/cache/oat/gypdlraftyr.cur.prof

    Filesize

    481B

    MD5

    7105d35373b7a76e90b2d176a7e416a3

    SHA1

    feb8d900e9ffedb48b6c070e7fb75a2dfe0141c9

    SHA256

    e3267d0d65fd54b0e522b014dddb6e5363d8abfa1e3c80d2c16e8dcb1b4bc20e

    SHA512

    5733cb97898d533ce6f6c305e8dcee1d8b00695906212ff2bb2ac525e77b0d1d517f30def75fc547d975d223d131fb994ad6ea5adac7df247b514b31d706d705

  • /data/data/com.butstood6/kl.txt

    Filesize

    237B

    MD5

    8c3d3db0073532d642c39d90dea54d36

    SHA1

    c8b99809e9b1503fd0b2de2d613aa385d7cb4a73

    SHA256

    c05a7dd9ace413c02df941cb2df606e63be43f708880a1f1e1afe60b96d67345

    SHA512

    a0d4624d3e425f992a7cf989fa863dd7a1b07e984e6eef4a6e90ecc588b3f7862fc64b41c7890b8e7b46284a5c4783804e35fc5bcd77195cb48fe1438ce6887b

  • /data/data/com.butstood6/kl.txt

    Filesize

    54B

    MD5

    7b63e99d19af460003a88205e5bc5ccb

    SHA1

    10e46b0ee5d2f333b6b911264462b75d92a408cf

    SHA256

    ffc59dba96360950b2a770e6daeef446a212e439369df2389bace09c69e1d030

    SHA512

    3c469571e5a7ff95313c16489ad270562f7d86b51d4a4602f343db5aecce3184bc6d25c6007a9ab0511cf897ad169ff0b497da74514ea22d73ae547c431de3e1

  • /data/data/com.butstood6/kl.txt

    Filesize

    68B

    MD5

    f2c0c3d47b4822c5d5f144d832b15e8f

    SHA1

    e1b9551ca0631574ddd20c66b4b228b692c80b10

    SHA256

    8e6e16afc128efd2548c086bbd7a8c34cef371f5f26baa7ccca49bec52e48e54

    SHA512

    c1a4dc6456b1674dbcb9fbff904fdaaa3fe7c3e5a2d2ccb5226bdd00a88db0a8bdd9fdc66c24c0530c2f458ceb1d5d7745d0df70157419df7f81f1b57e69a86e

  • /data/data/com.butstood6/kl.txt

    Filesize

    63B

    MD5

    db184b4ea826a312ecbaa6ece53f2a16

    SHA1

    a2508bd61d7947150c26da7e2ca915fcd6f9e6d9

    SHA256

    8ef5bcd7c8e386f4e24973a105ef9eccb9ebf68f579a8ddc30fbf2f8e3b85d0a

    SHA512

    d687a757f5ef6b16433d87dcd554dc99e825338219885b238b4f21a8d9f490670cd9c00b6d1924f971a97724e99adb2c508db120c59852e678b3e8778eb1b7fa

  • /data/data/com.butstood6/kl.txt

    Filesize

    437B

    MD5

    68796e29be42ddb50351068ad2590ade

    SHA1

    bfd66c5df8dbaa57c37fe1b43632e0dbd76c88d8

    SHA256

    7afd45c0b4a6c6c6fbb9ad78d701b707e3f700b23f768796448878b59368ff30

    SHA512

    9814619d6e823517136619c9c6d599fde6127996188a84fdb70301a57d2d839ad153a7110b20f9272c1290b69a933b477c7c274a7a6dced08d475feae750838d