Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    05/11/2024, 22:04

General

  • Target

    6bad28d3aba3d10e2d90d0354082529a316967c4f7c0fae83fc8c540a680ba1c.apk

  • Size

    2.0MB

  • MD5

    42aa8b78d3a0c8ac5d8dcbbfe446a21a

  • SHA1

    ea7cdeaad0215ea837c1a3b93e49d6cfa1e03551

  • SHA256

    6bad28d3aba3d10e2d90d0354082529a316967c4f7c0fae83fc8c540a680ba1c

  • SHA512

    3237dae3334b2645a25098f5ba8d140e2e921166ed8cd9fc3abe2ad0399e7a2fbf1c73db060682e1db271ed01a146bd6cb8be83c6a321a4fab36a8a8ab2d227c

  • SSDEEP

    49152:Usp/LQW60/B0DZCZ57fEIUEZdvXJeM8Trt/7OrV2tyd9IJN:Usp//B0yfmELvZeM8H5YV2D

Malware Config

Extracted

Family

octo

C2

https://uzaykesifveteknolojigelecegimizinharitasi.xyz/MDQ2MTZjMDhlZDQy/

https://yapayzekailegezegentasimaprojesi.xyz/MDQ2MTZjMDhlZDQy/

https://yildizlararasihikayelerveuzaygemileri.xyz/MDQ2MTZjMDhlZDQy/

https://bilimkurgukesifvedonusumharitasi.xyz/MDQ2MTZjMDhlZDQy/

https://paralelgezegenlerveyapaysavaslar.xyz/MDQ2MTZjMDhlZDQy/

https://galaksilerarasiseyahatsanatyolculugu.xyz/MDQ2MTZjMDhlZDQy/

https://sibernetikveevrenselakilliyonetimi.xyz/MDQ2MTZjMDhlZDQy/

https://gelecektekiuzaykolonilerindeyasam.xyz/MDQ2MTZjMDhlZDQy/

https://robotveinsanbirlesmesimacerasi.xyz/MDQ2MTZjMDhlZDQy/

https://bilimkurguvetoplananveridunyasi.xyz/MDQ2MTZjMDhlZDQy/

https://galaksilerarasiiletisimveanliksistemler.xyz/MDQ2MTZjMDhlZDQy/

https://gelecekuzaygemisifantezivegercek.xyz/MDQ2MTZjMDhlZDQy/

https://uzayzamankapsamivedonusumkalkani.xyz/MDQ2MTZjMDhlZDQy/

https://zamanmakinesivemultievrenselgeziler.xyz/MDQ2MTZjMDhlZDQy/

https://paralelboyutlarvedijitalruhtasarimi.xyz/MDQ2MTZjMDhlZDQy/

https://galaktikekonomiuzaycagelecekyolu.xyz/MDQ2MTZjMDhlZDQy/

https://bilimkurguvedonusumolasilikharitasi.xyz/MDQ2MTZjMDhlZDQy/

https://yildizlarveteknolojikmedeniyetler.xyz/MDQ2MTZjMDhlZDQy/

https://karadeliksiralariuzayarastirmalari.xyz/MDQ2MTZjMDhlZDQy/

https://galaksikarasivakumbilgeliksistemi.xyz/MDQ2MTZjMDhlZDQy/

rc4.plain

Extracted

Family

octo

C2

https://uzaykesifveteknolojigelecegimizinharitasi.xyz/MDQ2MTZjMDhlZDQy/

https://yapayzekailegezegentasimaprojesi.xyz/MDQ2MTZjMDhlZDQy/

https://yildizlararasihikayelerveuzaygemileri.xyz/MDQ2MTZjMDhlZDQy/

https://bilimkurgukesifvedonusumharitasi.xyz/MDQ2MTZjMDhlZDQy/

https://paralelgezegenlerveyapaysavaslar.xyz/MDQ2MTZjMDhlZDQy/

https://galaksilerarasiseyahatsanatyolculugu.xyz/MDQ2MTZjMDhlZDQy/

https://sibernetikveevrenselakilliyonetimi.xyz/MDQ2MTZjMDhlZDQy/

https://gelecektekiuzaykolonilerindeyasam.xyz/MDQ2MTZjMDhlZDQy/

https://robotveinsanbirlesmesimacerasi.xyz/MDQ2MTZjMDhlZDQy/

https://bilimkurguvetoplananveridunyasi.xyz/MDQ2MTZjMDhlZDQy/

https://galaksilerarasiiletisimveanliksistemler.xyz/MDQ2MTZjMDhlZDQy/

https://gelecekuzaygemisifantezivegercek.xyz/MDQ2MTZjMDhlZDQy/

https://uzayzamankapsamivedonusumkalkani.xyz/MDQ2MTZjMDhlZDQy/

https://zamanmakinesivemultievrenselgeziler.xyz/MDQ2MTZjMDhlZDQy/

https://paralelboyutlarvedijitalruhtasarimi.xyz/MDQ2MTZjMDhlZDQy/

https://galaktikekonomiuzaycagelecekyolu.xyz/MDQ2MTZjMDhlZDQy/

https://bilimkurguvedonusumolasilikharitasi.xyz/MDQ2MTZjMDhlZDQy/

https://yildizlarveteknolojikmedeniyetler.xyz/MDQ2MTZjMDhlZDQy/

https://karadeliksiralariuzayarastirmalari.xyz/MDQ2MTZjMDhlZDQy/

https://galaksikarasivakumbilgeliksistemi.xyz/MDQ2MTZjMDhlZDQy/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.denizbank.mobildeniz

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.like.lift
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4218
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.like.lift/app_loud/nMdKlwD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.like.lift/app_loud/oat/x86/nMdKlwD.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4243

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.like.lift/.qcom.like.lift

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.like.lift/app_loud/nMdKlwD.json

    Filesize

    153KB

    MD5

    fd9537a86f397cc5ea685c5430648f17

    SHA1

    62b25ae7bd2ded1ecb3e1adb3241b113921507b5

    SHA256

    9d10e57aeebaf8605fd4966cb42c31bef4abc3436e06cd6eaca5c089217d1ef1

    SHA512

    20db63ef5ef71a9725a26bd7b19486716be0732a575d66422cb6067676e2ac6358ad783f44f721fcb941f8c6b019c8a17e00f234f8c0c3a124d18929fdf673d1

  • /data/data/com.like.lift/app_loud/nMdKlwD.json

    Filesize

    153KB

    MD5

    251dba26f7885efd67e42b44c26d9252

    SHA1

    8eb322cef7f35107aa06b8f1232c24e88ba8dd80

    SHA256

    2f3367038daaf47e4534a3a44e6588c43b47c0dbde74fec2069cd15d333d03b1

    SHA512

    d444cad319f61b682b91ac62ef0d28cd7c45a8117b7410abd5f6cb0abfbc2b6f13d1646da356b708726114009e3e4f10fbc017cbc252f6dd5326ba82e8c73916

  • /data/data/com.like.lift/kl.txt

    Filesize

    59B

    MD5

    8b74973910da2cf3ec593709dbedbafb

    SHA1

    8a79b9508a5c008361895bc6dcf362bfb163771b

    SHA256

    f6656c3d33c038e9ebbe166087fbeb150c0c3e47b459eab4031de11787314f7c

    SHA512

    11ab8f9a06ef3b6b15e52462680a9e64325448900f90c014a2a99ae32d231be0a2cc4b5fda278665f68277b5f85431ddaf19b08573a3deb5e6a80355ef1d0c27

  • /data/data/com.like.lift/kl.txt

    Filesize

    423B

    MD5

    6e4e063525d50369c9a6ff8ab2ff7433

    SHA1

    3dee557bc9992a4b07a9016f7a1010b65ea9079e

    SHA256

    84a9877c8e724d1c6aff25b30bb1ba9509c860d426a5d4163e67cf1f8dad84d4

    SHA512

    daa4c8460e26ae2a27be331a01cd2dac9aab3e71eefcc7a6f5d9faa2c807df5cb273032a11fbd820309e1ee1b12c3b15d2ce3d233a352113eefcaaa0d0d20970

  • /data/data/com.like.lift/kl.txt

    Filesize

    230B

    MD5

    8fa1bd71b685e1dfe1f4000ed0564568

    SHA1

    d37fc881b96f5e5b3480ed5a4c0b891f4d1dfa53

    SHA256

    d86ce5728d981a21241d58310fc4c7b9c9a688195ff7fdd663d43b729237e86d

    SHA512

    de7be4c59ffe7e7ed75f38a1448b31013ba5aa117091c4bffc83e86e1b1f699f530c79ebd525724688bab7c04cbc51b7416ab1aebe8d8964b0bdee4d6a3b9fae

  • /data/data/com.like.lift/kl.txt

    Filesize

    54B

    MD5

    3957ac262f8c03fa518a6bcef53b428e

    SHA1

    ec780e9a6d6ae0ea2b67a0f2c0d363593bda3133

    SHA256

    6381b39c9a2336d5f3792b3246c9fdf4cd93574674e57e2d99bc1e64fa947f7d

    SHA512

    43493eb92353dc6acb252817a3239f3ad1d2a48e703d533c47460d84d486dcb6ce02d0669db0b0aa830c3626c4173407be5e03cde5c1395c3b8c4f1937f6b4a4

  • /data/data/com.like.lift/kl.txt

    Filesize

    63B

    MD5

    8b9dd9826f03d691f6253ce7912c1d0d

    SHA1

    251e5666207a04be8b4ea47ee82eb5b036f69522

    SHA256

    edacbb96453f60eb803a447d6bd70e34e571eda588e0e46c3d07944f527fdb1d

    SHA512

    0d35f37ae662420ea60fa65c6573c06ef4d885ebfa2a616961d1a5203f50e58a7a474dbd0944c53da0ce5363e1ffabe019a69e23115caa4c099437cc86a22aba

  • /data/user/0/com.like.lift/app_loud/nMdKlwD.json

    Filesize

    451KB

    MD5

    a81a6be054a9bd63829884ebfac7e48f

    SHA1

    788b118b0cb1fb9c36c7e6e3d17509d060bf3b49

    SHA256

    9c30be88483b09633bb72d8a5daf87d487d1b569fac23fbb329f4e59ac023868

    SHA512

    e50584ed165d0d216bc14ff504e2f338a2bd8f785f2c53ed2d692553b5108c0c1f08692d360349e73145885ab840ae6a2a0afd9f018642314181c1e90ec423de

  • /data/user/0/com.like.lift/app_loud/nMdKlwD.json

    Filesize

    451KB

    MD5

    43531c56eb376ded0bbfb6eef775b9a7

    SHA1

    fd98cafb4cf73e3dd6378845a6f0027c8690abad

    SHA256

    129935c95a1d71f651f48f76326f2af99fb2b925bb1e9d8c4acec1b69818cb52

    SHA512

    c40b894c2bd1481b95584a09671d03878d1a7cda9d414d8813ea1a817c75e22a5b0b337f58d87870e36a4bc312fe78bef5bde32ee7faa111d70f1b049f753e55