Analysis

  • max time kernel
    49s
  • max time network
    132s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    23-10-2024 22:04

General

  • Target

    371868d7bf4189743a60b45923bdc58b90918745188446c4d1c004f19d117b41.apk

  • Size

    2.1MB

  • MD5

    44817e5ab3480fa890c4a0941c997d06

  • SHA1

    a4ed5f2a320dbd99ba0e9c6db97bd44172d511c8

  • SHA256

    371868d7bf4189743a60b45923bdc58b90918745188446c4d1c004f19d117b41

  • SHA512

    c6d749dc4d9b9d91e04dae55171e9b6a0f72079db01201e082893cf43195112feef9dd36b4d91abd812c1b438b61dc2d44665d2e5f40f63af51bfd4c64856397

  • SSDEEP

    49152:YdTlcgM+D5oOAMsLSblBNwpMOJ/NeI1K8Uhp77Na5CJ1jrcvtJij:827GBBapMOnl1K8Wt7I5gl8tJM

Malware Config

Extracted

Family

octo

C2

https://dijitaldonanimvegirisimdunyasi.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaveakilliteknolojisirlari.xyz/YjdkMWRjNTllNzZi/

https://kriptoparayatirimvesanalpazar.xyz/YjdkMWRjNTllNzZi/

https://fotografvedijitaltasarimodulu.xyz/YjdkMWRjNTllNzZi/

https://gelecekteknolojivemodatrendleri.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojivesanalgerceklik.xyz/YjdkMWRjNTllNzZi/

https://bilisimvedijitalveriprogrami.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptoparayonetimi.xyz/YjdkMWRjNTllNzZi/

https://sibertehditveakilliguvenlik.xyz/YjdkMWRjNTllNzZi/

https://gelecekinovasyonvegirisimrehberi.xyz/YjdkMWRjNTllNzZi/

https://teknolojideakilliverionerileri.xyz/YjdkMWRjNTllNzZi/

https://verianaliziveteknolojigezileri.xyz/YjdkMWRjNTllNzZi/

https://dijitalekonomivedonusumprojesi.xyz/YjdkMWRjNTllNzZi/

https://akillifabrikalarvemakineler.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimvegirisimfikirleri.xyz/YjdkMWRjNTllNzZi/

https://dijitalodaklivirusaonlem.xyz/YjdkMWRjNTllNzZi/

https://veridunyasindastratejionerileri.xyz/YjdkMWRjNTllNzZi/

https://akilliekonomiveblockchaindunyasi.xyz/YjdkMWRjNTllNzZi/

https://bilisimdonanimveoyunteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://fotografvevideoeditorununyolu.xyz/YjdkMWRjNTllNzZi/

rc4.plain

Extracted

Family

octo

C2

https://dijitaldonanimvegirisimdunyasi.xyz/YjdkMWRjNTllNzZi/

https://yapayzekaveakilliteknolojisirlari.xyz/YjdkMWRjNTllNzZi/

https://kriptoparayatirimvesanalpazar.xyz/YjdkMWRjNTllNzZi/

https://fotografvedijitaltasarimodulu.xyz/YjdkMWRjNTllNzZi/

https://gelecekteknolojivemodatrendleri.xyz/YjdkMWRjNTllNzZi/

https://robotikteknolojivesanalgerceklik.xyz/YjdkMWRjNTllNzZi/

https://bilisimvedijitalveriprogrami.xyz/YjdkMWRjNTllNzZi/

https://blockchainvekriptoparayonetimi.xyz/YjdkMWRjNTllNzZi/

https://sibertehditveakilliguvenlik.xyz/YjdkMWRjNTllNzZi/

https://gelecekinovasyonvegirisimrehberi.xyz/YjdkMWRjNTllNzZi/

https://teknolojideakilliverionerileri.xyz/YjdkMWRjNTllNzZi/

https://verianaliziveteknolojigezileri.xyz/YjdkMWRjNTllNzZi/

https://dijitalekonomivedonusumprojesi.xyz/YjdkMWRjNTllNzZi/

https://akillifabrikalarvemakineler.xyz/YjdkMWRjNTllNzZi/

https://bulutbilisimvegirisimfikirleri.xyz/YjdkMWRjNTllNzZi/

https://dijitalodaklivirusaonlem.xyz/YjdkMWRjNTllNzZi/

https://veridunyasindastratejionerileri.xyz/YjdkMWRjNTllNzZi/

https://akilliekonomiveblockchaindunyasi.xyz/YjdkMWRjNTllNzZi/

https://bilisimdonanimveoyunteknolojisi.xyz/YjdkMWRjNTllNzZi/

https://fotografvevideoeditorununyolu.xyz/YjdkMWRjNTllNzZi/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.venue.medal
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4256
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.venue.medal/app_nurse/fjaOoY.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.venue.medal/app_nurse/oat/x86/fjaOoY.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4282

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.venue.medal/app_nurse/fjaOoY.json

    Filesize

    153KB

    MD5

    85077e2cb05109a9f2a5efc40eba3e43

    SHA1

    a722e3c82f9dd21e4103e043b79918097f406db3

    SHA256

    a8a16a16341ff5fae9968e3e07d6646d235b9f93bd2bb287d70febf12207d7f2

    SHA512

    41cf3fe4f18596eaea41d4cb45c742eeb188a5864727086bcced79ca28d6a069d635a815f27e693391125353af2547b9b39153454d40c7841935157bad479478

  • /data/data/com.venue.medal/app_nurse/fjaOoY.json

    Filesize

    153KB

    MD5

    d4aade1ece2d9f7c349b11605bb159d3

    SHA1

    e29c01e9c93acbfa78f0d2bb28b9ef51371c0aff

    SHA256

    8143748cbf8301c24ce3c9d4fec63e3a459c2fd182cdb7d611dc4475e55a9d72

    SHA512

    52b5b397d3515e5572088301dd4af1e1f955d1647351607007f70e32b372207d5ef6381c98cbe33cb0158f4b5d56fde2c968925fed61d3cdb404489ed2773e4d

  • /data/user/0/com.venue.medal/app_nurse/fjaOoY.json

    Filesize

    451KB

    MD5

    a3a9252b1a425513254ace1373f74629

    SHA1

    564d9679325adfd4dc9b30dba40df0d7b5952ee2

    SHA256

    ceb73cfd296934327bc3089c5a96e5583ce2b7088406787686b0718d661bcdad

    SHA512

    51cfece788cf08a633e4bd4da5a5aca6de9aa33e6b459676b0e34ad746bb5d6ae2ef2989d9a0caa6fb34e4ebeaec8038d277ce9844973bcd2f85228db15998f3

  • /data/user/0/com.venue.medal/app_nurse/fjaOoY.json

    Filesize

    451KB

    MD5

    76f76432c345862bd73816a4497f92fa

    SHA1

    d16c12e8b3af6465e4060f390ade9f7edd83419d

    SHA256

    35b44a5347be5183a36417f7637c5e84f324576fdb6a5d476642195f2995ddfa

    SHA512

    0070bd6ace95ba9cbab08c9f5936804cb46bb2094fd85d46b9bf85ee3c3bb81688b66c3f340804318b452b5dc2dfc6af62527a323163a93b2b7919964b997e8f