Analysis

  • max time kernel
    144s
  • max time network
    138s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    11-11-2024 22:25

General

  • Target

    d90d8b1ac2f9409a597c6631c085f1f2d7b74203fff86894b1d6ecf18c27cc78.apk

  • Size

    2.4MB

  • MD5

    1f57423f11392522043026b7ed773493

  • SHA1

    430eec543d9830f795aa0b26b7f9ff4b786b512d

  • SHA256

    d90d8b1ac2f9409a597c6631c085f1f2d7b74203fff86894b1d6ecf18c27cc78

  • SHA512

    d00fa1e44089cb5a17ec8be8513a15f709a9764fb218505acc75a6db4d45056f28bf5b7d5da0abfbbc7cb90267f83cd900b5010761b6a73cba51be4cd870031e

  • SSDEEP

    49152:2HOyQmT5CkFh5vnNWDaC5MyhcWD/ThPZOpwKa6h9/egR9+zYRDpg91FyfJzIE1r:ZwnvnNu5bD/tUp9a6h1TqgpiFyfBIEp

Malware Config

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

rc4.plain

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.nearshetk
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4229

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nearshetk/.qcom.nearshetk

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.nearshetk/cache/oat/xnjebtmrsaepcrk.cur.prof

    Filesize

    559B

    MD5

    373c00ecf9bebc8adc3f7ca7f5af3725

    SHA1

    ecc945e16d209dd80bd75401f5ab4d406387c0e3

    SHA256

    cdbe8e06e902d1cbb9859d7f52d33f077e9fb6db1d730878fa218308dae22a1b

    SHA512

    dea5919207f882db2b63b83d85a83d0a4ecfee40974b2e99a974cf68783fb04217fb4e21a3d3db633497f72405c8f4a60b02811589988fe43794147146300c4d

  • /data/data/com.nearshetk/cache/xnjebtmrsaepcrk

    Filesize

    2.3MB

    MD5

    32defed5f0267b734b4ebc737f72265a

    SHA1

    a27f10b386c5666c5454138eb141203f57b30d56

    SHA256

    77cb6887a71abda5ecd318cfc425572a92ed7743dc49156b0125f0e3d58f5865

    SHA512

    a936971998e109ba2100bff9ab045bb5e6677d9f649a79514a6f36b5387217a840cb3382a0233b97e9476262caf1ecdd025ed3df8ac25b9ea03d41638cf4d475

  • /data/data/com.nearshetk/kl.txt

    Filesize

    237B

    MD5

    22064ca7c850bea942c6590e8c7987a4

    SHA1

    f36860c60ec16ec0bedb67fb5dfc0e316588cbdb

    SHA256

    5ef3ff4a9ec840cf4d0891a8e2b791f09f623f54b7e87fe0d73558b3439f3583

    SHA512

    a53ae186c3a02a4ffb5d537990edf7232bc0ab0dc601ac1f309420640b3660712e34c1f504ce537cbf0b2980f9120625b4dd7fae45f165bb85d1e924475ecde8

  • /data/data/com.nearshetk/kl.txt

    Filesize

    54B

    MD5

    57198f04715084a6ab39a0b8e8f556e0

    SHA1

    9a396de0d8e6bb8539c65e254b00c5f6d1c0eff8

    SHA256

    b9abefefc5c0e05b5a2e5883d5fd842c613489fba958b062013a69c5756ad559

    SHA512

    ab1d2f9e4e0dd9a9000c92416473f728910e4aa362e36781e4576b7798d623a19642191aa2282e0a9064d26206424b22d375fcfb2da0e60eca5349ff5d91dc6e

  • /data/data/com.nearshetk/kl.txt

    Filesize

    68B

    MD5

    cffbd7dd2f98bc8759a454aa32921e25

    SHA1

    9855848eb10d14ed41034d1f7c651a49ee6df6d1

    SHA256

    42ed59ca51dbf2f17d594beb54136a577c19ba855636d3834287fdfa3fe84084

    SHA512

    86745c7a7c4b7370882e9d97bb0ed641933448c50f6e377249e656a99a24ab5e185a662b3d4fb07460c5d4f2955f075044f1067117b60c59e83c5eba30dbb9c1

  • /data/data/com.nearshetk/kl.txt

    Filesize

    63B

    MD5

    b3aff74e1e33441f2dda3dc514a189d0

    SHA1

    cd83fa60bc9da7d319a8b6e16e4d4698af452a83

    SHA256

    f90039640c29bd86b12a443c45e02201fe583a296d440206f7f81fc9796dae96

    SHA512

    a874ae2e479575f07e08ace0ed544b8693c21a60d98371e9f00468e8e192523faaa6bf79eb84947fcab43233014a99d089576b4e722a8f0d46d67a5013ce2633

  • /data/data/com.nearshetk/kl.txt

    Filesize

    437B

    MD5

    f060db278b357c930d206b7cec89a593

    SHA1

    bc06a1699088f342e66a7115fcbc1aa036c27253

    SHA256

    b8d1f91c3faa8617bd9dc594a708f78857d15ab552e5456bddb6f779d9f58849

    SHA512

    99ae5dd53d3339b38752ecb6e68ca34057983a0668ab80ea0b2209148e6ef3254c9346dbbccbdae2d9c377fe567a6384e1685e7a8e2f95060febbae941a33cc9