Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    23-10-2024 22:01

General

  • Target

    fad146604310cd227b562915d56697c3fb4319af5b52cb4f18fc4665eeeb93a8.apk

  • Size

    2.0MB

  • MD5

    6b83ae529b3b8dddc985e586e659fcd2

  • SHA1

    f16834d02820c06533720ba79035b35fa512920f

  • SHA256

    fad146604310cd227b562915d56697c3fb4319af5b52cb4f18fc4665eeeb93a8

  • SHA512

    9fae71d608125215c8d2a6f2e4d8045dd062a6c1514ce5b6878f8f3c969263b82ff86d5ec40582aa773ca9a2edcf043a3ce11a8097350e36c62550ba9178d21c

  • SSDEEP

    49152:2HaTS8yePa8fqaDZ3gn8f5cGWYuumteg9G9YJs3ORRW:6PDUaEZ3g4jiRG9oXW

Malware Config

Extracted

Family

octo

C2

https://dijitaldonanimvegirisimdunyasi.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaveakilliteknolojisirlari.xyz/YjdkMWRjNTllNzZi/

https://kriptoparayatirimvesanalpazar.xyz/YjdkMWRjNTllNzZi/

https://fotografvedijitaltasarimodulu.xyz/YjdkMWRjNTllNzZi/

https://gelecekteknolojivemodatrendleri.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojivesanalgerceklik.xyz/YjdkMWRjNTllNzZi/

https://bilisimvedijitalveriprogrami.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptoparayonetimi.xyz/YjdkMWRjNTllNzZi/

https://sibertehditveakilliguvenlik.xyz/YjdkMWRjNTllNzZi/

https://gelecekinovasyonvegirisimrehberi.xyz/YjdkMWRjNTllNzZi/

https://teknolojideakilliverionerileri.xyz/YjdkMWRjNTllNzZi/

https://verianaliziveteknolojigezileri.xyz/YjdkMWRjNTllNzZi/

https://dijitalekonomivedonusumprojesi.xyz/YjdkMWRjNTllNzZi/

https://akillifabrikalarvemakineler.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimvegirisimfikirleri.xyz/YjdkMWRjNTllNzZi/

https://dijitalodaklivirusaonlem.xyz/YjdkMWRjNTllNzZi/

https://veridunyasindastratejionerileri.xyz/YjdkMWRjNTllNzZi/

https://akilliekonomiveblockchaindunyasi.xyz/YjdkMWRjNTllNzZi/

https://bilisimdonanimveoyunteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://fotografvevideoeditorununyolu.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://dijitaldonanimvegirisimdunyasi.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaveakilliteknolojisirlari.xyz/YjdkMWRjNTllNzZi/

https://kriptoparayatirimvesanalpazar.xyz/YjdkMWRjNTllNzZi/

https://fotografvedijitaltasarimodulu.xyz/YjdkMWRjNTllNzZi/

https://gelecekteknolojivemodatrendleri.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojivesanalgerceklik.xyz/YjdkMWRjNTllNzZi/

https://bilisimvedijitalveriprogrami.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptoparayonetimi.xyz/YjdkMWRjNTllNzZi/

https://sibertehditveakilliguvenlik.xyz/YjdkMWRjNTllNzZi/

https://gelecekinovasyonvegirisimrehberi.xyz/YjdkMWRjNTllNzZi/

https://teknolojideakilliverionerileri.xyz/YjdkMWRjNTllNzZi/

https://verianaliziveteknolojigezileri.xyz/YjdkMWRjNTllNzZi/

https://dijitalekonomivedonusumprojesi.xyz/YjdkMWRjNTllNzZi/

https://akillifabrikalarvemakineler.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimvegirisimfikirleri.xyz/YjdkMWRjNTllNzZi/

https://dijitalodaklivirusaonlem.xyz/YjdkMWRjNTllNzZi/

https://veridunyasindastratejionerileri.xyz/YjdkMWRjNTllNzZi/

https://akilliekonomiveblockchaindunyasi.xyz/YjdkMWRjNTllNzZi/

https://bilisimdonanimveoyunteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://fotografvevideoeditorununyolu.xyz/YjdkMWRjNTllNzZi/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.lion.renew
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4499

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.lion.renew/app_advice/nHSOr.json

    Filesize

    153KB

    MD5

    18a8e78b89224dca0735145e801b351c

    SHA1

    31c27acf2e29847bcb9830cdaa6eab3a8a05ef24

    SHA256

    3d76ec015771a6d8df285ccdfefb0dd12921efeab968a611701d548bce9b46f6

    SHA512

    2f5fb8c64d74be2398e7671f756d2b519a12d18946c09e0d888747fb5d7f3b888c4372a65a15a3909b9a6dbaf84fc074e8c05926fb1aa678e8db42ffe581239d

  • /data/data/com.lion.renew/app_advice/nHSOr.json

    Filesize

    153KB

    MD5

    c6a74098fab6462b5569906e3f985caf

    SHA1

    b0f37266e00f6fb040d5eed6d26afbcd670cbe76

    SHA256

    d18a4ca46d1e416141f5e1235df0a28ce403ec06bb08aed08d27ff42972f2978

    SHA512

    6b5d7f64f145e7e86f2efde9418272937261fa461b2b287ee70d9af8c1c807ca25bd3778d85f06dc93feb0e61dc65b818a6c339d7b4693bff8ede6972e627ebe

  • /data/user/0/com.lion.renew/app_advice/nHSOr.json

    Filesize

    451KB

    MD5

    220f7b470fe4a2bc4d0bf161dc33bc4d

    SHA1

    203d1070be59faca5e4643e0d2ca3fe4d2027b48

    SHA256

    c1619e109f34b0ddfb162a93197429ff49107ed86bcb1fc7eb28d815aa52a76e

    SHA512

    647944375adf4c19f83cb8987a11a335644d529b7655176a23cfee89fb7173f8539a6e1033653dcbe6963727d46104f2d3afe85aa94fbb5a8cb5fc2f08ba07bd