Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    22-10-2024 22:14

General

  • Target

    c260577b82be27027df2a54844bd75938928db10f996ab82fdd74886dacdc95c.apk

  • Size

    1.8MB

  • MD5

    1e4706f85707b2144704ff362b0a0718

  • SHA1

    1e68e75d9753ccb48f534b78cda252d104d525b1

  • SHA256

    c260577b82be27027df2a54844bd75938928db10f996ab82fdd74886dacdc95c

  • SHA512

    365d1e987a962d6f0e590ae33f393cd2e49d736ad5f347cffcb752628f829b3d62d24f6e66168b57fdd9e68736a39ac04e322d2c25315be152eb57c57156a1df

  • SSDEEP

    49152:QL+JtLOKArV/10yxQH2twse7TVPofBqNMi9FGM2uj1o0MJ:g+Jx+rn0yxQH2toTVsBqNJFD2ujfMJ

Malware Config

Extracted

Family

octo

C2

https://dijitaldonanimvegirisimdunyasi.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaveakilliteknolojisirlari.xyz/YjdkMWRjNTllNzZi/

https://kriptoparayatirimvesanalpazar.xyz/YjdkMWRjNTllNzZi/

https://fotografvedijitaltasarimodulu.xyz/YjdkMWRjNTllNzZi/

https://gelecekteknolojivemodatrendleri.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojivesanalgerceklik.xyz/YjdkMWRjNTllNzZi/

https://bilisimvedijitalveriprogrami.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptoparayonetimi.xyz/YjdkMWRjNTllNzZi/

https://sibertehditveakilliguvenlik.xyz/YjdkMWRjNTllNzZi/

https://gelecekinovasyonvegirisimrehberi.xyz/YjdkMWRjNTllNzZi/

https://teknolojideakilliverionerileri.xyz/YjdkMWRjNTllNzZi/

https://verianaliziveteknolojigezileri.xyz/YjdkMWRjNTllNzZi/

https://dijitalekonomivedonusumprojesi.xyz/YjdkMWRjNTllNzZi/

https://akillifabrikalarvemakineler.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimvegirisimfikirleri.xyz/YjdkMWRjNTllNzZi/

https://dijitalodaklivirusaonlem.xyz/YjdkMWRjNTllNzZi/

https://veridunyasindastratejionerileri.xyz/YjdkMWRjNTllNzZi/

https://akilliekonomiveblockchaindunyasi.xyz/YjdkMWRjNTllNzZi/

https://bilisimdonanimveoyunteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://fotografvevideoeditorununyolu.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://dijitaldonanimvegirisimdunyasi.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaveakilliteknolojisirlari.xyz/YjdkMWRjNTllNzZi/

https://kriptoparayatirimvesanalpazar.xyz/YjdkMWRjNTllNzZi/

https://fotografvedijitaltasarimodulu.xyz/YjdkMWRjNTllNzZi/

https://gelecekteknolojivemodatrendleri.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojivesanalgerceklik.xyz/YjdkMWRjNTllNzZi/

https://bilisimvedijitalveriprogrami.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptoparayonetimi.xyz/YjdkMWRjNTllNzZi/

https://sibertehditveakilliguvenlik.xyz/YjdkMWRjNTllNzZi/

https://gelecekinovasyonvegirisimrehberi.xyz/YjdkMWRjNTllNzZi/

https://teknolojideakilliverionerileri.xyz/YjdkMWRjNTllNzZi/

https://verianaliziveteknolojigezileri.xyz/YjdkMWRjNTllNzZi/

https://dijitalekonomivedonusumprojesi.xyz/YjdkMWRjNTllNzZi/

https://akillifabrikalarvemakineler.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimvegirisimfikirleri.xyz/YjdkMWRjNTllNzZi/

https://dijitalodaklivirusaonlem.xyz/YjdkMWRjNTllNzZi/

https://veridunyasindastratejionerileri.xyz/YjdkMWRjNTllNzZi/

https://akilliekonomiveblockchaindunyasi.xyz/YjdkMWRjNTllNzZi/

https://bilisimdonanimveoyunteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://fotografvevideoeditorununyolu.xyz/YjdkMWRjNTllNzZi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.hawk.bundle
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4332
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.hawk.bundle/app_injury/Ea.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.hawk.bundle/app_injury/oat/x86/Ea.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4358

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.hawk.bundle/.qcom.hawk.bundle

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.hawk.bundle/app_injury/Ea.json

    Filesize

    153KB

    MD5

    e37aad36f14f0b4ad92d21cff461093e

    SHA1

    a071ae1c6ef1996d6ba58bef3833282b941e668f

    SHA256

    1244311c22f3add6b7a97931834ffc9d6dc422f2dfea42b293908f3678977681

    SHA512

    97b5f8d1aab83f6d1469d4609dd9a42f016f83684a5806a6b352743540fc8be5c19a97b1a6f9be8f7119ebb43557b601a14f1080768626acbf47291f38df36bc

  • /data/data/com.hawk.bundle/app_injury/Ea.json

    Filesize

    153KB

    MD5

    3b30e0d2e7d9cfee0484384381a8fdc5

    SHA1

    580ec858f3367bb8313fdfba43f29ad371c00cef

    SHA256

    ebb98dbd6fc34f161ed43667cae056e5760060edfc69c2ce257d65734a001e5c

    SHA512

    62c02441644da51c65e25be72a68fff423e975d9ccc3b80ad00386ef03743168867120500e6c9846408af9143fa6cf585450bdb08346938481a5f8a3aeb9431d

  • /data/data/com.hawk.bundle/kl.txt

    Filesize

    45B

    MD5

    7a24b78cd661a5664f4beaf909550be0

    SHA1

    33bcc863ac8121cd49d43bcecb195f54ffaa6de0

    SHA256

    992faae00a1269cf3e2b42d7b86c0fb3189c4f71cc3019c715a033819c5d34fe

    SHA512

    67aae0ef003e38544804b80bf3ea385328ee5c67b14fe2bf9a22a18e0f373d9ecfa0f28cbc0b0d2befc25cabd0585536ec2014256990204af038c69f2367ec6a

  • /data/data/com.hawk.bundle/kl.txt

    Filesize

    423B

    MD5

    cdc12c811e8af814e397cbc12e559a4f

    SHA1

    bc802f565abb4ad21875ba0447f2775881e6fa7b

    SHA256

    a698b2b8857b9872449802eaea3f3694e275500d8547681e17e36b55b5169059

    SHA512

    0524bd0a174b79f8715991c186a6701d6c63f69ca4c1b0cfc799b3c80a6bf96d54d2db73e0cc0b27435dc4f80e895c1d55bdcdcc598c2284b585f65ea03a77d2

  • /data/data/com.hawk.bundle/kl.txt

    Filesize

    230B

    MD5

    5c4c9b75103c528e9775ab7e1b0fea09

    SHA1

    3fa6a86d2f687cdb0fd52b1c6a9daac1d03c3d0c

    SHA256

    425d63e44d609edae921846d10278e1f41d084c5ffccf1fb3bed5e91723281fa

    SHA512

    9db683a37da159fc5f197ba17fa940760005fa9aa41f6430dc3e443b96f3662c6c5c26301177b3307a9b07cdd25697598ce2107c794e861a7c3eadf3f3ae42e5

  • /data/data/com.hawk.bundle/kl.txt

    Filesize

    54B

    MD5

    68c251857d965464f7c37727c3196a30

    SHA1

    64616082dd3a6381c1bf6b84ae098d8dfae603a0

    SHA256

    a44c37ce0901afe924d6cbb0aa62cdc10288c6afe8867131c594fd521e1b886b

    SHA512

    a2ff6947fbdffdf6792f3d846bba05b3c9273f5fbfbe03cab81efb8b9a745e574736506826531dad2736568ecf6bf4816304a4d70ab50692f5a004c413f55c15

  • /data/data/com.hawk.bundle/kl.txt

    Filesize

    63B

    MD5

    e19d9f403ad2ab54272ca938b8217118

    SHA1

    448172c4fd5e0ac36ebe0fdd335c02a3705c5459

    SHA256

    5b465553fbb86b357e677c33a865fdfbaa074ec7d1f8e594f268de974684de9c

    SHA512

    2767440360fcc4ab69dc5c3634ea9177214749a83a7163f1b53e3e958cf73f617b6ff87e98b4eaf560bfa32aebd5161d30d71ccf02d02712e448b969081c421d

  • /data/user/0/com.hawk.bundle/app_injury/Ea.json

    Filesize

    451KB

    MD5

    26847a41ce7542f06d624f5c8971039a

    SHA1

    7291dc9a7c2061acb87cbb0e1e3c94bdb0908978

    SHA256

    48789c7c4d4e85d349c9866d1379518f281f9a1cc5f80f6492cf6afc7724c244

    SHA512

    d2a7277b2c9f1d7cb3440239199cedad30bf351dd85ade7180557f076fdc94669b23116f569604b9c7a9ddaabcb5e20e1c4daaf0f842ba76adcae32da21f66a2

  • /data/user/0/com.hawk.bundle/app_injury/Ea.json

    Filesize

    451KB

    MD5

    b26771bf6549e3d1488bec7321cfeded

    SHA1

    55d484c93e210bcc0f7af2bbc610e849d70e1aca

    SHA256

    0a43f7afc0c7a793ed11847310c754176dc1a039c75f1fc26619885b478cb044

    SHA512

    a295726bc1882c1afa6a57525e6eb96e72aaa6a97d30f0e53846351673a369efcd27e9132fba63d2aa7371f67abe979ee6f3481093aef5784349953bd6f53590