Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    06-11-2024 22:09

General

  • Target

    3c48e9a2b2364978a253dd3ca9a8fdc9d08a312a5312fb4d4558f7ca2fdb692a.apk

  • Size

    2.4MB

  • MD5

    f9337ee134b5efe47966745502aadc2f

  • SHA1

    b666d6512d0e458a146a923dbef00c3c7c4d0f14

  • SHA256

    3c48e9a2b2364978a253dd3ca9a8fdc9d08a312a5312fb4d4558f7ca2fdb692a

  • SHA512

    3a89439600913251f5d459c8d5fc0d54a99ced5b59544853c98d508849250765ceb357609c4dc8406eadd68750607cc152d18e9f7474ff583634d732112af918

  • SSDEEP

    49152:HwNEMXDGTtVytSCyJb0N6VWwEHFMH+mikYVsTaQ94Vi:IfGxItSF9sdWHfikAka0

Malware Config

Extracted

Family

octo

C2

https://mutebabacankarac1231.com/YzM1YThkNDFkNmQ0/

https://vercankaraca2213.com/YzM1YThkNDFkNmQ0/

https://verkaracesfercam121.com/YzM1YThkNDFkNmQ0/

https://muteelercen22.com/YzM1YThkNDFkNmQ0/

https://vercancankara231231.com/YzM1YThkNDFkNmQ0/

rc4.plain

Extracted

Family

octo

C2

https://mutebabacankarac1231.com/YzM1YThkNDFkNmQ0/

https://vercankaraca2213.com/YzM1YThkNDFkNmQ0/

https://verkaracesfercam121.com/YzM1YThkNDFkNmQ0/

https://muteelercen22.com/YzM1YThkNDFkNmQ0/

https://vercancankara231231.com/YzM1YThkNDFkNmQ0/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.takeport6
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4252

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.takeport6/.qcom.takeport6

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.takeport6/cache/oat/tqtnqybcqg.cur.prof

    Filesize

    326B

    MD5

    e8638a7de87bde4abc45baca1c99b7e9

    SHA1

    8d8e4df982ff3180e6f289c2c8cadde78af092a1

    SHA256

    d2b517759eba50f43c0f1ef12f687352a00d494d2f8f748ec991729a074b574b

    SHA512

    5e04e32444986742b55852480583239aa5ac1a3b445840d2b7fdce62b8892a00c256251ba1828d313cb0b0b3b07ba1853f8a62bdad824425838a245bcc774581

  • /data/data/com.takeport6/cache/tqtnqybcqg

    Filesize

    2.3MB

    MD5

    88303d60d366a42377cab3aa1c840917

    SHA1

    2cee5d2f5bf420f8e5c85ff034c0d2ef38fab0fe

    SHA256

    0caad25c83b3c15a453072a999b79b7ed6179ffb93b8a73033875d328e290f20

    SHA512

    0c75aadda7846eea5416823b95b7ecf28146b519925b667cd065cda06b967e7ea66cf9cf542a9380dc3bfc89a99a82eedb5e1443fe0f2823e6846c54aeef8363

  • /data/data/com.takeport6/kl.txt

    Filesize

    237B

    MD5

    a2b155df54b7274a1e1e910a262df35c

    SHA1

    859889988f1428bb2340bd377116d108c6b77525

    SHA256

    c43e72c40ce15c22b97115c8e97ae49fe30da0d826611b293bfbcd8d4e352e79

    SHA512

    6e715a84b1d0bdbfd73876028f34a2bdf21913c156da54360b5d1cc656ce0211af36a116420c0b140e5bcb0f660e266c4b644eb3985a2626bb18b2b3913cbc01

  • /data/data/com.takeport6/kl.txt

    Filesize

    54B

    MD5

    08c40c745d9f5cbbf421f945bb2c6913

    SHA1

    c316d21b20a14aed6a540dc9a74386939218990a

    SHA256

    a3e2e66e1fc443018a5ddecc2abd9a44dbb2608e9fe4609e364d82b09cd7d6b9

    SHA512

    3c34aafa815098008c615588c56418e058402dab9ddacb71dc2a93f047c136d9b19f0e6669ee73c8a5ab820ae583a1a4e5ef2aae456b657abe6493a42fea2bd3

  • /data/data/com.takeport6/kl.txt

    Filesize

    63B

    MD5

    fc93408eb22fc8100713320fd57f30d1

    SHA1

    5c6c9eec5b7e4b0daef55488d740b79d7abc1454

    SHA256

    19f307994c8623b446279a92f3cefdf8d77b4815b30f8cc14ba20119c8804d80

    SHA512

    49b676b88b14dd0e9c254901baa58bfc5f667cf5de57c698edbc2a7ddaa725115d8a9cfc0692a0bc8319ca4b28be5339a8d3d7f162e837b1baeffdd33c4d1996

  • /data/data/com.takeport6/kl.txt

    Filesize

    45B

    MD5

    64d2095359b08984df27e330dd87df8c

    SHA1

    0ae4db5a940838db13dbb5d736ac1a4db8296dba

    SHA256

    482d0afefcdb988ec75f3693564ef7df9f2975a6d538b941a6cdb8f97c6a1658

    SHA512

    4ccad162b6615d5a6088f8802e079b0e43f4ae42ccb5817d44195870da4d5ee2e78c97ab07954459b296db3af72f77bfd3d0039946e2992225fc1bd1fa02f74a

  • /data/data/com.takeport6/kl.txt

    Filesize

    437B

    MD5

    7f19d8c4165a73b6679a77d528d1514a

    SHA1

    6829708b74f7a3a5eddb99181db69119b3fecb4f

    SHA256

    cf878fbc0b56786db282add83d130c913702096e51f00cb6678ab96c05132402

    SHA512

    24e96a5d5a128d154a9ae5cf530ac6ed6c1d9fb5d7e7ef847e3e07dccf07f665dfedcc6e2e7166b1432f338cc249de28907cff82c95104eb0d972a3f99dafb28