Analysis

  • max time kernel
    41s
  • max time network
    135s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    15-11-2024 22:00

General

  • Target

    8b20b81c06189c69d8d2e4460bb6cf85de75412caa66f6474b20006bc2ffdf81.apk

  • Size

    2.5MB

  • MD5

    99d9ff0d8155871dd9aff142a35bd12e

  • SHA1

    3618423b90a989aae310bad8ef31cbec5353c161

  • SHA256

    8b20b81c06189c69d8d2e4460bb6cf85de75412caa66f6474b20006bc2ffdf81

  • SHA512

    ccb9cf6c5e90bf238ed30f7ac7859e2787b5f61003ac03978433c7af7ce103bfd7b6995bbf3cb3e440847d07a08ed7e69bda556b8736ee8c34e10b6e087e967b

  • SSDEEP

    49152:zmJ2OsrUFDdh3vC7ubsxyubObhbIFiEimDnDX0KbyBVbhsA8w872Zx3pbpxfSAFO:zmJ25rMDnfCSb2yubA4i8nQdhe72XNq3

Malware Config

Extracted

Family

octo

C2

https://populeryabancianimaserver.xyz/MDQ2MTZjMDhlZDQy/

https://eglencelikahramanlaranimas.xyz/MDQ2MTZjMDhlZDQy/

https://cizgifilmtutkunlarianim.xyz/MDQ2MTZjMDhlZDQy/

https://renklidunyavekarakterler.xyz/MDQ2MTZjMDhlZDQy/

https://animasyonvekulturhikayeleri.xyz/MDQ2MTZjMDhlZDQy/

https://yabancisanatcizgiustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cocukvesinemaoyuncular.xyz/MDQ2MTZjMDhlZDQy/

https://cizgidunyasindakiyabanci.xyz/MDQ2MTZjMDhlZDQy/

https://animasyontavsiyeveyorumlar.xyz/MDQ2MTZjMDhlZDQy/

https://sevimlicanlilarhikarakat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancianimasinemaustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatyaraticilik.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverkaliteleri.xyz/MDQ2MTZjMDhlZDQy/

https://kulturelanimasyonvesanat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancicizgianimasanatyolu.xyz/MDQ2MTZjMDhlZDQy/

https://eglencevesanatcizgihikaye.xyz/MDQ2MTZjMDhlZDQy/

https://yabanciveklasikanimasyon.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverdunyasi.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatkonusmasi.xyz/MDQ2MTZjMDhlZDQy/

rc4.plain

Extracted

Family

octo

C2

https://populeryabancianimaserver.xyz/MDQ2MTZjMDhlZDQy/

https://eglencelikahramanlaranimas.xyz/MDQ2MTZjMDhlZDQy/

https://cizgifilmtutkunlarianim.xyz/MDQ2MTZjMDhlZDQy/

https://renklidunyavekarakterler.xyz/MDQ2MTZjMDhlZDQy/

https://animasyonvekulturhikayeleri.xyz/MDQ2MTZjMDhlZDQy/

https://yabancisanatcizgiustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cocukvesinemaoyuncular.xyz/MDQ2MTZjMDhlZDQy/

https://cizgidunyasindakiyabanci.xyz/MDQ2MTZjMDhlZDQy/

https://animasyontavsiyeveyorumlar.xyz/MDQ2MTZjMDhlZDQy/

https://sevimlicanlilarhikarakat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancianimasinemaustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatyaraticilik.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverkaliteleri.xyz/MDQ2MTZjMDhlZDQy/

https://kulturelanimasyonvesanat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancicizgianimasanatyolu.xyz/MDQ2MTZjMDhlZDQy/

https://eglencevesanatcizgihikaye.xyz/MDQ2MTZjMDhlZDQy/

https://yabanciveklasikanimasyon.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverdunyasi.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatkonusmasi.xyz/MDQ2MTZjMDhlZDQy/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.denizbank.mobildeniz

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.ramp.reflect
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4220
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ramp.reflect/app_novel/Pjy.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ramp.reflect/app_novel/oat/x86/Pjy.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4245

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ramp.reflect/app_novel/Pjy.json

    Filesize

    153KB

    MD5

    d6b14b0dd1276a997bab1cd3de6f0f5c

    SHA1

    2df6cf004744d9cf058af4a0b21d92350726e9ac

    SHA256

    4ec8aef20e2ae322bd98eee1bcf33cfc5d497d884976576befa8e8a1c5446e49

    SHA512

    b0130d431c699ef11183fdc9ab5101f6bc2e3357cac5848e6fd4cfb1c3e7aebab2ef30701d43e5bf1b94b0c776a4337a0efe17b7a44c46a0d1bdf3d959b41b49

  • /data/data/com.ramp.reflect/app_novel/Pjy.json

    Filesize

    153KB

    MD5

    9fcacd526dec440899db948e92ace8f7

    SHA1

    7829ad2d6b21f6ed67d3977a22820a5bc864f98f

    SHA256

    a3538a7f0bee36423219b599490d6a5b0cd66c53dd429084870340ca3c7d1128

    SHA512

    ee673a4c505ac57494ffd8058234a56de01ff4be345843741e4873e7e2526faa0491fd91cad0d45daa9982da1b4d3d926f60cf5fe1845b42aefdc96471ede7a9

  • /data/data/com.ramp.reflect/kl.txt

    Filesize

    45B

    MD5

    23cdf0ee6e97baa8fb1225564923fed5

    SHA1

    d42d3425097455d937eaec5f319e4c079b12f78c

    SHA256

    efe9184bedb1f65fe3f8e7084b3e584b5e43bc7c9cd4acb1f82c2154300e0d52

    SHA512

    fd6e569660230f18e7759dfaabe6d67cdb3d9f3f1c997602bde8e02c3a459f942f0ea056196445397671b827eb6a40083ed6fe0d43e4f7fed15ad1a38fafa83b

  • /data/data/com.ramp.reflect/kl.txt

    Filesize

    423B

    MD5

    11f6096b78b76e17bca5adbc170ed41d

    SHA1

    c56066883ba031d121154810cf8316c945bc60b2

    SHA256

    a4d59881270d7b375a70571fa65d3f3ae92ef636cdd4fa8bb53722ef5de7635c

    SHA512

    52b905fd5820cf08a29cb03451fe221dcbb47980e0294f5625b1288b41bc5476c860db6e450d612bec985c35dc2c4fea707ed4abc4a63de77ca51f291a7948fb

  • /data/data/com.ramp.reflect/kl.txt

    Filesize

    230B

    MD5

    5a016beff6db05cf779fda6d154bfe8c

    SHA1

    2449548a637ca9ed3c09a88d294bfba7d4d40419

    SHA256

    e762d8dd5cef0f08e3fc863de12e23f21df0bb9ef35590de28f8c41d6ce0cda2

    SHA512

    45c4888c93e85cdf3f21e7d1ec0b3e499bf1f169479a83e51188c05d41f22f505337efb0060086f5ec2195ee5b23da282e7a5e7d9d2d1b610afb3fd5b11bd924

  • /data/data/com.ramp.reflect/kl.txt

    Filesize

    54B

    MD5

    5a63c5dddeedf2cf8299997db089b187

    SHA1

    ece4c75ae6a4fe16df5c4b00fa74a39bf89225c9

    SHA256

    5b3e7b816eadc747f9eb1047f3ffb1c3c8727123ea29c9d880b61f1c5c16c948

    SHA512

    7eccc7594de3eef93a960915a45ac0f89c350752655ddad10dac21c1f59622202a42eaec402f7c2afa204e4340f2fe2a9fa8a766ef1a07073c74603ae3613c53

  • /data/data/com.ramp.reflect/kl.txt

    Filesize

    63B

    MD5

    e088e21deba71f70fa743fb95da70db5

    SHA1

    a851c86b6c61a671afb64098662cbb03824cb757

    SHA256

    fa618dc98ff836f45752b15866f71b590abfd24f5622a480e45c80ec9ac0f3fc

    SHA512

    ae3105aae18b55e196f318b088d1d4be1bf91bd7e888f91aace2d8a77e9d3097b1de28c890702a1f54c18999f63192f524f3a77d1dd5dd7c91f1e76ceb637eba

  • /data/user/0/com.ramp.reflect/app_novel/Pjy.json

    Filesize

    451KB

    MD5

    18b13fb2b97d9d4fccd2895b7fb20955

    SHA1

    ac3d16160568c5b2fcdc6fd51e3c03b9ba901853

    SHA256

    2836ac4ffb48360987b32e7808fbc0fbb9cce093f9d7b10946edd1fe866adfbf

    SHA512

    e3a3f0c150bc52aafb4bf94c26d87b479a740b8480950ad94220f2270a0a12b2d07c426f384f45d5f1fd4b9fb0c3b07238d08b37979078bb2e1661ddd6d68c92

  • /data/user/0/com.ramp.reflect/app_novel/Pjy.json

    Filesize

    451KB

    MD5

    e1cee873669b3029c15d409a8f885abd

    SHA1

    b32f48d7bb7cbda649fd2e07f188cda036114b0e

    SHA256

    3921411987d1d8f2d6fb340297728a4e1210ca1ceda83aad9392e137d1771b5d

    SHA512

    5a142a4548df9379e509641dc90aa45f5a5d36f8ed59d165d7c1fe8bd5e35ee893608952fae30710c1f340d24be6aa36d0960b79ebd2016636fe020c1bcd7bdf