Analysis

  • max time kernel
    143s
  • max time network
    140s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    14-11-2024 22:01

General

  • Target

    30eb0c3fc6c85070ad501898ec1dba928bff042ee249c22e84de8eacdf105f6d.apk

  • Size

    2.7MB

  • MD5

    c4d612777aef910384b985c29be7a8e3

  • SHA1

    e47313e23f3a3b53fb7d04b23c4eceeb7b11719b

  • SHA256

    30eb0c3fc6c85070ad501898ec1dba928bff042ee249c22e84de8eacdf105f6d

  • SHA512

    11942b0681f94885a5c358ca87eb4f4133df6d43efdc39052321e239e48eca86a526a3b7299c4498371aecdb7fc19878779632f1a96c6366a324c4ad729b556c

  • SSDEEP

    49152:OJ2OsrUF/U/KCJ4+7ubsxyubObhbIFiEiIZsqYjHgir0fOrb1jmMUlzqvIpu7RJE:OJ25rM/U/KO4+Sb2yubA4i8BYjHlr0Q8

Malware Config

Extracted

Family

octo

C2

https://populeryabancianimaserver.xyz/MDQ2MTZjMDhlZDQy/

https://eglencelikahramanlaranimas.xyz/MDQ2MTZjMDhlZDQy/

https://cizgifilmtutkunlarianim.xyz/MDQ2MTZjMDhlZDQy/

https://renklidunyavekarakterler.xyz/MDQ2MTZjMDhlZDQy/

https://animasyonvekulturhikayeleri.xyz/MDQ2MTZjMDhlZDQy/

https://yabancisanatcizgiustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cocukvesinemaoyuncular.xyz/MDQ2MTZjMDhlZDQy/

https://cizgidunyasindakiyabanci.xyz/MDQ2MTZjMDhlZDQy/

https://animasyontavsiyeveyorumlar.xyz/MDQ2MTZjMDhlZDQy/

https://sevimlicanlilarhikarakat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancianimasinemaustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatyaraticilik.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverkaliteleri.xyz/MDQ2MTZjMDhlZDQy/

https://kulturelanimasyonvesanat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancicizgianimasanatyolu.xyz/MDQ2MTZjMDhlZDQy/

https://eglencevesanatcizgihikaye.xyz/MDQ2MTZjMDhlZDQy/

https://yabanciveklasikanimasyon.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverdunyasi.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatkonusmasi.xyz/MDQ2MTZjMDhlZDQy/

rc4.plain

Extracted

Family

octo

C2

https://populeryabancianimaserver.xyz/MDQ2MTZjMDhlZDQy/

https://eglencelikahramanlaranimas.xyz/MDQ2MTZjMDhlZDQy/

https://cizgifilmtutkunlarianim.xyz/MDQ2MTZjMDhlZDQy/

https://renklidunyavekarakterler.xyz/MDQ2MTZjMDhlZDQy/

https://animasyonvekulturhikayeleri.xyz/MDQ2MTZjMDhlZDQy/

https://yabancisanatcizgiustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cocukvesinemaoyuncular.xyz/MDQ2MTZjMDhlZDQy/

https://cizgidunyasindakiyabanci.xyz/MDQ2MTZjMDhlZDQy/

https://animasyontavsiyeveyorumlar.xyz/MDQ2MTZjMDhlZDQy/

https://sevimlicanlilarhikarakat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancianimasinemaustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatyaraticilik.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverkaliteleri.xyz/MDQ2MTZjMDhlZDQy/

https://kulturelanimasyonvesanat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancicizgianimasanatyolu.xyz/MDQ2MTZjMDhlZDQy/

https://eglencevesanatcizgihikaye.xyz/MDQ2MTZjMDhlZDQy/

https://yabanciveklasikanimasyon.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverdunyasi.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatkonusmasi.xyz/MDQ2MTZjMDhlZDQy/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.denizbank.mobildeniz

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.imitate.trade
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4265
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.imitate.trade/app_dinosaur/lDK.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.imitate.trade/app_dinosaur/oat/x86/lDK.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4291

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.imitate.trade/.qcom.imitate.trade

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.imitate.trade/app_dinosaur/lDK.json

    Filesize

    153KB

    MD5

    fb4b95d491e041a9b69bb1d17be1c98f

    SHA1

    6fec5c122a7ae5e2742b9ab6776c767f8bc8611c

    SHA256

    4c07ea034ced23297f4b52f3c8c8c57870330881358a30e7ed8298808559e454

    SHA512

    f395afb011c1cf09d381b3ab5684314f410773571f04bc33331137d475cbf0d1cd300def3822168cf5c6ab03a7ca2d4f61d5f206ccbdbf1251925a24298a9992

  • /data/data/com.imitate.trade/app_dinosaur/lDK.json

    Filesize

    153KB

    MD5

    51d677f10cd301df844c7ab546636d03

    SHA1

    06814d1ecf56453d63c3b48e4a6c6169ed2c2e2f

    SHA256

    401864b84a5c3c7a165c1175f67e8854328d8c831595f27d0273c83a7c3aaa2a

    SHA512

    42265639877703b4bb8dcbe1d4825a2f150c7c0fdf128cedef4605f745b9e9d02ee6db898663784c28b53de036b062a293a42a2170108837ec078130a118eaf8

  • /data/data/com.imitate.trade/kl.txt

    Filesize

    45B

    MD5

    8fcbc04fb3cef116f9f7bb00b67e9632

    SHA1

    168ab2f0daa93fc4be3e11b16f58aa4fc13f57fc

    SHA256

    64e5cb799b4597c65175ff3ebe28c674589cbc43b40dff7c1f1d4d8c91f63e98

    SHA512

    9e9d2e632964b5d43f1a7d4dfb13ca4996f24d1dbbb78bb4ed7c4870eaf36291de3ccf851a68c6fad16c4acfb1a27afc060bc48e54afd4fa7ef07f779248f856

  • /data/data/com.imitate.trade/kl.txt

    Filesize

    423B

    MD5

    3e0ebc7a1f131244ed8166311a902ba0

    SHA1

    4292e39e9379e44138da183ce94b6f127ab9e9fe

    SHA256

    5b3f645aaaeda4e4a2d3bcbcd1a0b2d4b12780acc744a3ed545028782e00d35f

    SHA512

    0ad9489ac78c19f2d21fa81ddfa47555f8c616b01708a103320583a2398e1fd9d9a4770dab14d6bc806c83831dede1c3adf5f938cdb6e5e04fe4d615d99f7257

  • /data/data/com.imitate.trade/kl.txt

    Filesize

    230B

    MD5

    cc569426e5663ed92970754596cca8c0

    SHA1

    5789455afa82644499a2562df35ce159fdd649fe

    SHA256

    bcd631b7a8281603f337176a6b08e3c9a052c82ad3a87943f2d10d0c6a503d05

    SHA512

    67a44c0a0c4cd26781a88608ddfb6e2244db9c188713e9221fa1cbd81ad9d862057a80b027af907428d2bd07b96879dc43306aeb02520077fed6c42e12b326d6

  • /data/data/com.imitate.trade/kl.txt

    Filesize

    54B

    MD5

    33c646b379211d958d7fb3c00611c344

    SHA1

    2586a057f61385a70388d69ddb2a91c3d1d2c310

    SHA256

    69697ac72e31e379832d146360aa6c80e7873d91abf93ef9cc4980970b62f200

    SHA512

    f4d343f8ef50ce2390ee89513c1769448bb218af5cada4b52e5bf9604e2bdb6faaf8dc93882e712207d91d26bf1d32ae097954d011a230de8c08e5941d89f4df

  • /data/data/com.imitate.trade/kl.txt

    Filesize

    63B

    MD5

    472c4ff1b4fc504163894909a79a1a9c

    SHA1

    e8edfffc1094c4763c33819d8976acb8ecdaf6fd

    SHA256

    32cc81fa53335da4169532ceed020a5e6bc89d827a189e9dd40bf10fd905975f

    SHA512

    f084c5308fd005b4881cc85efefd574d8aae58366b9818ae6ff912aaf76250256350510c36dcf04d6331e14cdf18690454166cdde22da2208e1e00cc25d8ab7a

  • /data/user/0/com.imitate.trade/app_dinosaur/lDK.json

    Filesize

    451KB

    MD5

    b25a04267a5fa0a45dedb03ceb39b645

    SHA1

    579dd007851e59969ef7eb1444b1e41a9397a775

    SHA256

    f1e85279eecd053bd4c81996787b0d0c15e938c18ee9b14ace1d3af8125b2206

    SHA512

    f8d60115b3f6988c0cf5d7f7224e44205c4896a8a39098b4c912b8bb1639f54c3ce6d0dceba61698904d66ee0067e1137a1030b1059d603d14f38e9e3c01b080

  • /data/user/0/com.imitate.trade/app_dinosaur/lDK.json

    Filesize

    451KB

    MD5

    cd56522a7526468275a1732ee08223e2

    SHA1

    8544461a2a7304c9d9e4f6b86bf741ad363182ce

    SHA256

    db888fa54163d08875a4b33977ab2deb797d4b53ebf1d79a72955c81c2504f28

    SHA512

    dbbab73a9629fbb5208956493fa0b1f52d450690d46354a236c88f5cc10fe091aee289508d11bfb483679118c4d02eeed0761f11eff019cd10919d86b056f9fd