Analysis

  • max time kernel
    41s
  • max time network
    132s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    15-11-2024 22:01

General

  • Target

    814d02f923bb740f064d3b92cdacbbf5cb0fd9cbfc9dbf78b5da6a8055186895.apk

  • Size

    2.4MB

  • MD5

    c60f9e300f2338fc664befcc582fd9d3

  • SHA1

    f79ffbf6e3eab458e6b119493a27a647f8cef1a2

  • SHA256

    814d02f923bb740f064d3b92cdacbbf5cb0fd9cbfc9dbf78b5da6a8055186895

  • SHA512

    d41bb2099da440751854cd6291a2f316f9999c2de93896a71ef164a18a39fbf143e898662449d4fc191d247874accaddf5911b7e3edba486a3f872d55e063954

  • SSDEEP

    49152:Yf1jewg5hRMODb6Lg1miL9kSqkIMRlz3ociPc4ZHY+qB48JrULJle5:Ujs8QOLgwiL9kSJIMnR/4ZHY+qBLULJS

Malware Config

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

rc4.plain

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.hourstand1
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4255

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.hourstand1/cache/lqhlgcljfqgumcl

    Filesize

    2.3MB

    MD5

    f7870775553cae144ddec77a05f97e43

    SHA1

    c4989d426c5c05ff69073fe942790e7dae4223f1

    SHA256

    b49b1629a50a11de223f237fb8a45546b6cdc5fcd1ff8831d25a9ed8d8e2cef5

    SHA512

    216abee941ecb72024764bbade1e17b4d69e543ee32e318a4d5aa3caa5c5985366179bea7dd353f77dd512f7a158889b462bd571f751705b6bab73ee0c529eec

  • /data/data/com.hourstand1/kl.txt

    Filesize

    237B

    MD5

    65f94a8b7d98911cf30de50edec9174e

    SHA1

    76ea7d17b42bcc53f58a0ec6307aba0b4ef24dbb

    SHA256

    e6362caff46b3457e72345f5b418184dd86be02edba5793df177b6c5e118eec8

    SHA512

    e53c14a8d86a1d85fe33d569b611344d708e746b327624b8846774bdc311cb7618d70bf77bd9d49151745aca215f79f6c50a8fd0ef6796a1ff4e75a0d3a4af06

  • /data/data/com.hourstand1/kl.txt

    Filesize

    54B

    MD5

    2d3d10dce51cd832f54a0dbf2de0543e

    SHA1

    bfea559d9646c7b3f23f5019d2d232e958e0ed32

    SHA256

    d305c3f0544f0527730e7a3bfccc7835c543a83cf175c573152ff258eebcfdee

    SHA512

    a7c6bb9f1fea4307200f0587cdb1f1dd889e2241d0dba1f0825d0edd5923a57de5386a8124edd6c1534fe5c37f13af1c77c5af59293c3720354163ac85754c93

  • /data/data/com.hourstand1/kl.txt

    Filesize

    68B

    MD5

    b0661c830ca8d321eb75934018891064

    SHA1

    ffc97e1539a66a365d1e03dc3be0d8b2d5f7726e

    SHA256

    341e8d14364cdc6e69650b4f0fbefe817f7abfa085fb2ea106a30c47808ee77a

    SHA512

    7fa539f9e0f851f3563fdf19593fdc094ecb0a45c67b8365631ad6f69f3c736e1a53724b580818899eae384adf054d750a2eba14d61ae4cc4cdd959fbecdae80

  • /data/data/com.hourstand1/kl.txt

    Filesize

    63B

    MD5

    5b9e586880cdd61a724c1743815be7e2

    SHA1

    e23aa4c7a2fc8dcbd71a09ea376077d34cd76b23

    SHA256

    954a3596305ba03746ada1dc2933f9d7030673d3e1b868d8f042fed6087e17b8

    SHA512

    f68eea8d705b949233828ea21af713c41fa56a191b830e790a564d87afbd1a42183b5fab4f6851bf0dfc336742355a9c16853d589a6e0af32f985bb9d33e3561

  • /data/data/com.hourstand1/kl.txt

    Filesize

    437B

    MD5

    7ecb3a12ec3af7c0062ff3114a5a30c6

    SHA1

    9108e9512b7f972b6422570f2a73b013f5ee4a08

    SHA256

    9a722084ea61772e400905d9385cd99d4dc933a87cb617add7427f4b41088dad

    SHA512

    de02ad1a6d2261279321a35b7b1d46cc3f8ccfb3388a1e7bd7eb66948c9f88cdb06afc9756d0bc59883d3f740cb46e76373c9e1ab8edd7f2bf3cc2c93e3efeaa