Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    24/10/2024, 22:02

General

  • Target

    459a135ed431631b5cbed4735a00fd88aa0cf703ac6fc28b47564ea08fc998ff.apk

  • Size

    4.8MB

  • MD5

    e2367bff04af5a4fb88b06fba7a25cc6

  • SHA1

    d86bc4622864e319c9952371228f6419278cccf2

  • SHA256

    459a135ed431631b5cbed4735a00fd88aa0cf703ac6fc28b47564ea08fc998ff

  • SHA512

    5f810dbbe5ed1de127c676fb2039634b8ee4f743e7206b63a4380eac842058d56811a4f1cf6ad7119b9ba69c87d08eba0ce13c70d4c78362d5565282792055b2

  • SSDEEP

    49152:/RsEXAOuXKuO3X2t45iS7xrGMrR60ytjVKScapb3Jv/CPTiUhn:/RsKoHO3X75iSRGLFVKshITiu

Malware Config

Extracted

Family

octo

C2

https://4945ec6a041536b9046824dd2fb4f658.in

Attributes
  • target_apps

    at.spardat.bcrmobile

    com.avast.android.mobilesecurity

    com.samsung.android.messaging

    com.google.android.apps.messaging

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Signatures

Processes

  • com.vandroid_clockf
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4357

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.vandroid_clockf/.global.com.vandroid_clockf

    Filesize

    194B

    MD5

    3d2a5fb09414a26d17975382f67c5c2a

    SHA1

    2b1f11b12d815a122928cf8d9b5859fd7160977b

    SHA256

    dca14491336c1fa675d425d19bd88c6e7d44ec781cfbd20b1ad0beb8e0f6ba35

    SHA512

    c54998fc0cb26da977cef11b9a258ae58db15e05a29492d9511d33892016d6e189c5a5b64c9a8672a946a4f6d7e0cba71d0497aa57fb03005562f96cd54b4581

  • /data/data/com.vandroid_clockf/.global.com.vandroid_clockf

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.vandroid_clockf/files/.u

    Filesize

    322KB

    MD5

    77dc50489b9323274732d27dc8a4e803

    SHA1

    0e02a3595b62489d0739d771881da8604d117c65

    SHA256

    c5684e792d1ebefea6aac09fed45911703fd58c899f8a08133d49dd91429a820

    SHA512

    0684a92f3e9c525384cfa53f531afba61e5930e1c27032a7e27e3315f72761b62e122dc34768d8162ba08f9bed53d148aa8dc034b46456bdd211f230637eba58

  • /data/data/com.vandroid_clockf/oat/x86_64/[email protected]

    Filesize

    13KB

    MD5

    7c49371a5488490ef5d195838712fb46

    SHA1

    b77d171d047ebfae5bd563c3218d295c508f0072

    SHA256

    840e923a3ecf73f2121d79f28af52a438b96b482fcea1fbddcc6767a0b8bfe05

    SHA512

    c5bd39507b8eb9fa1ac702e58e849914afb32fef17f48eb681f06eaca2969a97c3ae4672ce4ff67fa8579e002c53cb7221b87a12c937856c1e2423b2d829088e

  • /data/user/0/com.vandroid_clockf/[email protected]

    Filesize

    526KB

    MD5

    b0d5c23b56a9c7ebb36c2d8485f90604

    SHA1

    f9e11aa12c8701d90a39fff3ad2a0a7f67b352a6

    SHA256

    a5365a2889ebd6c42e312b3ceb4909b6a7b282d768224d73a5b58b35029bd375

    SHA512

    fa22231dd671a83bbbbe7fb3da10897b9c113abf1fd42426e27722b5c8a6d4c7fb07bc99e627403305c21c2c5acc9fdb22389fa17c5ea4c01a4a0bf21c4238e4