Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    140s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    09/11/2024, 22:04

General

  • Target

    9faf5666bafd89ef14684e50b048d64db9bc6ee1ca3d5a6175ec7efb9170faa2.apk

  • Size

    2.4MB

  • MD5

    23c9a532802444e045764c0976dd0590

  • SHA1

    a360eb7269a6ce6f79029d21f4ca13dfbc01a4d0

  • SHA256

    9faf5666bafd89ef14684e50b048d64db9bc6ee1ca3d5a6175ec7efb9170faa2

  • SHA512

    1f4c5d10577be7fae46ce347dd229403f89e50fcc597dc72b8ee40a12cb6a27e1239968d0dd64cbc69c7a8d1317fedc1b9136434c4fd46a045dcdf471f357af2

  • SSDEEP

    49152:7M7VZW0NeOws4+vfq8u482morStYUjhrfneCYOl+pFAeCUvwjySTmx:6yI4yfq8u43rS/jhrv2jIervmu

Malware Config

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

rc4.plain

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.toldfood1
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4216

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.toldfood1/cache/mmcekclycm

    Filesize

    2.3MB

    MD5

    4e0a023c71ed8cb7297d6ad3416813d7

    SHA1

    ae592f3709e76d3ebddc3c44dca00e7906e599d1

    SHA256

    5a594ef10d24029837e875c8472ed3fb91d99d3c62201cbffcf50b728629a7d3

    SHA512

    d69c4268a4dbb41a00c0762e47153d76e3a224f4e308df5b0fe0414a7ae785ceba3a2ee209e4db0e5b6a50f59e248655b76a81fc6ddedfdbd8a1b0658cddacab

  • /data/data/com.toldfood1/cache/oat/mmcekclycm.cur.prof

    Filesize

    533B

    MD5

    fd9aa209e5e5582beb0ad8d472f1238b

    SHA1

    90196d4b17fe91b1c1b755597a793849d2e1c72e

    SHA256

    0918cc3dc174f61814bcefd1def56d61bdbd8a6b0ba3e0a321ad313dce34370f

    SHA512

    01a948683407e67657f101303dc698a0ac6c4b7eafac314a64b2f18e85e535ba972354d68f0afc97f55dc4cde6a30db14fb6f8fa8862b60d838577f2f5f205f0

  • /data/data/com.toldfood1/kl.txt

    Filesize

    237B

    MD5

    bd6105b03de278231e6237a80afe7ab6

    SHA1

    d77b66c04894b58933dcaad9ccb60f99e0ec656f

    SHA256

    2297b955bd12973e9fa24bb8ab766aff7a2c1a9deb0800449fd9b97c12e8fce2

    SHA512

    d68e6a915353e050c32df9cb87b009107fcd16ae4b9034f57aab6a8932fed304e9b77cd986b22e28466e7c05e1abdb4f980e8f95d52933c9f02e850c88a3dbc5

  • /data/data/com.toldfood1/kl.txt

    Filesize

    54B

    MD5

    f1c33e7d2810ee1e08be2341369adde0

    SHA1

    14200caae141730e331c80ab87323ef221cf825c

    SHA256

    af242e9bbd36b3c7e8f7dc1a33d50984457bb9bd99c8a9bc28c63312cf8e76ff

    SHA512

    f1f788af0bda1dac035c3fd836e61cd280481a01b3f70cb60e1bff854985d1c7e71605b3163556fc93bebda6a4b1191700a49b8547cb7d7399c144ca3b2b49e1

  • /data/data/com.toldfood1/kl.txt

    Filesize

    68B

    MD5

    ca16318900a0b2e7d4e85f4d0f9621aa

    SHA1

    10448cd308e3babf3ae2ef71a793e45c58890d15

    SHA256

    1a6ccfcbe17cf78dafe4726d1cc7c747c78e5ffd9a38ce5e029f7fd711e85e36

    SHA512

    bd06ddb5af5c44be69b067bc5cfcc5c0a092648187aa83f71499abb4ca4380963c1572f860ffdf58168df890e702f8243a32819ce013e256f330f950dadf0399

  • /data/data/com.toldfood1/kl.txt

    Filesize

    63B

    MD5

    e7b6457c78a951f02df48441b7fcbb38

    SHA1

    a1b839792b2698c7de91d1aaa0eedd4acc24d3fe

    SHA256

    fda4e30d54bcb4b6ce5b184abd034c86fa3c54b5a7c8c2f265d11bcdf6133d76

    SHA512

    5533bd0500a59d9d4f9a75f1f930ce4c3889f9a0f0774e6888c23c0618097d70da188464eabdfdf94dd058766a6f4e2c0b2cf2f0faad2b0fe7571c5d2ea088f3

  • /data/data/com.toldfood1/kl.txt

    Filesize

    437B

    MD5

    f46b82596a1a89403a0d46f687cd19ad

    SHA1

    f2ed0fddc441750920af4d3a960930c8defb2f99

    SHA256

    bf9c7f40118bdde43f7f5ae3124789b03c2aaa2e43dae8ce8c3abc8bc5927599

    SHA512

    54ec1790fd4f205e8aecac8524ef3ebfefe184c98711ca1611fbd761eed0e617e127c6f8b3a6b768d3b0ae8a78315547b114a2ca8aec809b6107413f7683afc3