Analysis

  • max time kernel
    146s
  • max time network
    133s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    29-10-2024 22:04

General

  • Target

    a335cc50dd44341356d416874d1576e57f9b26419422d5b244d2b7350c328013.apk

  • Size

    561KB

  • MD5

    fc79314ea2b2d151f68427db3bf5720e

  • SHA1

    37c6dff6cde7e3a415e5d7fc0c3ffc5161554530

  • SHA256

    a335cc50dd44341356d416874d1576e57f9b26419422d5b244d2b7350c328013

  • SHA512

    ea9da600f6a0984c55fa25b0e0d5294b8e7c0b20635d80ea9139ac0ecee34d2239311ecb896a58532afe60f1000b30f748c40bef4921b778dff72d7946c7e83a

  • SSDEEP

    12288:UcKBFLh5v8XBFd5r+YA0qCwRJ/G2nOH/FL7Ibbj/Rjhmrn6:UcKBFLhmDCXxRJDnOHxU7RVmrn6

Malware Config

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

rc4.plain

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.denizbank.mobildeniz

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.endamongw
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4254

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.endamongw/.qcom.endamongw

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.endamongw/cache/oat/opocnipkqbjvph.cur.prof

    Filesize

    479B

    MD5

    4accd61219d9f951f25d742bcd863e2b

    SHA1

    b18f4cdb77bbcb8129a58ff8d21db2ec0e3f05ad

    SHA256

    2abf194f616bddd4604714e9c785c897b9bdeb3d5b7c235247ad550e52d47a5a

    SHA512

    718a746286cfc6feba40ef63d4e1e2547a330d7f7d5002dd88a0c6350458075f9097fc16a94f5bd150c92bffba70aeb2069a25bc449a295e4f6c57a8cb943d75

  • /data/data/com.endamongw/cache/opocnipkqbjvph

    Filesize

    449KB

    MD5

    9a7ac487ad8d8093a62151200dbdb603

    SHA1

    898edd909a1178ddd95bca4fe9b6a992be36d2af

    SHA256

    2c599d7f7deb5137a0651c15d7ea91dcd6e26746ba00e57925e9340579a77d6e

    SHA512

    2f405fec5433d66224566ae40bc23e29b25ca54b8607fa64c1a64ad7919d4fc7c260c15f5f199ae15c34746a4fedf86675f5023fcddd005b7190f10f7f3576b5

  • /data/data/com.endamongw/kl.txt

    Filesize

    237B

    MD5

    7593035d361771a017ebba0f7ab9f3a3

    SHA1

    10f06b0b997033e2f64e754955ec0208f9bca8b8

    SHA256

    904c12055814f6eb0d8f427dcf40afc0fa0a4f84133c4cb259b72811897ddff4

    SHA512

    ba183dcff78d7f115cbe37e09a4ff110748bbc1cc736bdd45b4efcbe65cada7071c9890f81ba01d287d507adc2e5f894a478e140e0fbe6db85cb527aab16d05d

  • /data/data/com.endamongw/kl.txt

    Filesize

    54B

    MD5

    cc3bf6af11304fe74f1429d7098b4aa7

    SHA1

    6634d1ee3a131bca7e448dbba82fd8c269e32fd5

    SHA256

    bebf0ae10e1ba25760164cf04bd7c11ec65a54aa24d92a83e737ba04d7342da1

    SHA512

    b0b4dad6ea18cf141974b7e265c540481d8fda283f70fb61173440a85143dcd9c9be065fe0d7d0293d5582ddecf6a3ea4bddab8c24303ef9f4ff0007bc1f427e

  • /data/data/com.endamongw/kl.txt

    Filesize

    63B

    MD5

    64a159121096c9fd4efae9c41b525cf4

    SHA1

    9d4e121ede8650c6975abaa1d55a156db3047c10

    SHA256

    686dff76ab9520771f5e9c8bdd39ce7b21a236d741fd76f29459ca5e6fa4258b

    SHA512

    1e3e6daa4e80cfa830f42e5b7f347086cb231defb6075a97b01f2dceb4664f77f969b75b0df047a412879660220afd24f5256fe279cc9b77df1b42f1ac9e69ef

  • /data/data/com.endamongw/kl.txt

    Filesize

    79B

    MD5

    b85a3b605923e6039621014646726d9f

    SHA1

    38a180614911df99fe3890cc26af4befef99414a

    SHA256

    a77774e12f18a95f2fbffcfaeb54eecb95cfbc5c8a716e066c3cc907331ce076

    SHA512

    afd686c02f3bf502d5a47485b820d36f83e739e3dddb48ed4d5865a29fafd131979b15012379fcad260ee825fa7d73e6483fdfec3ff939ffb33f9acdc1862042

  • /data/data/com.endamongw/kl.txt

    Filesize

    437B

    MD5

    247e3f05df88feed6985270e08922f55

    SHA1

    6839cc30412d6d215e6c7cc87a0acc8a345aa53a

    SHA256

    3132bc3f9dcc22837326a4c31c57b3f99e5695493ae24e7c7a998b3d3a0e024b

    SHA512

    741067d061846b684906e201e16d71c690a11e94912ac24d51d75a2c2a261d0d9b18dc0a03505aafa9588df386964814e7c459e15195792bd88d13668312d4a0