Analysis

  • max time kernel
    42s
  • max time network
    133s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    15-11-2024 22:04

General

  • Target

    1ba71785a7b7bcef9f733f0d9ddbc9862a1304d26fd88121ab032bcf40bd8491.apk

  • Size

    2.4MB

  • MD5

    67219f84e15a6ed95f0467b72f966ba9

  • SHA1

    319f3171047d9b7289280681ed735f7ff074a05b

  • SHA256

    1ba71785a7b7bcef9f733f0d9ddbc9862a1304d26fd88121ab032bcf40bd8491

  • SHA512

    5c615de8e68c9ffe4c86767e5a003fe30c565ca381bf32514d4cda96c2f15137acdab3a8ce31b51e065dff0051c79081118ac3e7cd9ecdc76c3e9bfc4601c163

  • SSDEEP

    49152:MT/xZSVYFLLPALstI0keExhaqZ2xzruZfqMxAfNsfPcTXCs+:24YFLzALsXkejxzKIMiNssTXCx

Malware Config

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

rc4.plain

Extracted

Family

octo

C2

https://malkafaniskm.com/NzY2NDZkZmViYjZj/

https://fukiyibartiyom2.com/NzY2NDZkZmViYjZj/

https://malkafali222.com/NzY2NDZkZmViYjZj/

https://oyunbaimlisi35.com/NzY2NDZkZmViYjZj/

https://mal1fukizmirli.com/NzY2NDZkZmViYjZj/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.runbeauty8
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4249

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.runbeauty8/cache/lkdsf

    Filesize

    2.3MB

    MD5

    a897d994fa09525b7e108a13af9acd73

    SHA1

    731a82f6088d03e8a5d84cb2b3ce2ae32b3ab4cc

    SHA256

    240e0659849df32fb63f15a8dc0c0584cd5587b124694e870ec0fd22306322b1

    SHA512

    60f857b571b93b74699d3b6f53c60a47fb73c1dd670d94a8e95663e496f79f34bacd2ca47a9e74d6b689906ea7bfe416ee8ada45d304c466090d4eb4ae221c67

  • /data/data/com.runbeauty8/kl.txt

    Filesize

    237B

    MD5

    6370c0e4fda239982b330103c66fb9dc

    SHA1

    3932cfef8eeecf8ea5b675076d63f5e5a9e592ce

    SHA256

    b5e734ee547da8a83e1bb6caaeb8011fa30693e1af0ef8b9e10a9c9720f78b1b

    SHA512

    fbbb32941ac67ae4a09960ad7556f1bac33c04b30ec36091b63c387d1a990eae62331d67c52727053218e205094c34c9b9a31d3b0999a6177762d71833abd790

  • /data/data/com.runbeauty8/kl.txt

    Filesize

    54B

    MD5

    1f69664931b0061eac152bab4db3c84c

    SHA1

    6d88a634228fb260033b993f010b06ddddb8c1a4

    SHA256

    4b9c9903deca7e17b5a7a15ab7da4e810a2e9dd39caed19e789e1958bd5d7548

    SHA512

    596fea3e0328df8bb8c724b420a7c0c2038bfffaba04a715d39ee9f28ecf3925adc8a56572c97afe80f905605ae801556cfb8dcf485dadd10311623f826db4e8

  • /data/data/com.runbeauty8/kl.txt

    Filesize

    68B

    MD5

    de52258da6030570225822622166758a

    SHA1

    f542ce6677035d974948f103ee53f7275b23bf08

    SHA256

    a7b1f463b212a7d79b8f0309b6d93c8444504874fdc5312c907c9fc8a3b7d3c8

    SHA512

    049a45009704df55bcb79eb09a78b960b31fd0ea08b7f6d196746902f02a4762a71596dccf95041d838dcac1896d61f02f38da91a64ada3a60c7d055e2337d1b

  • /data/data/com.runbeauty8/kl.txt

    Filesize

    63B

    MD5

    9da2ce566093b57a93217b11791e188a

    SHA1

    8586182e6d282216d497746d3e764339ab05dcbe

    SHA256

    09e9dfd89f65bf8f766baa3cb64b5bc06d67168438ed56746dcb1fb35a48b964

    SHA512

    f09a7cebed69921f005fc75c03934e3c01f18a0e28a77f4dc91ff3421798ee2da9d4b10da6c58b18e7a8d5248f0fd71806e9516d2c34fd2fc6b257f9fa6907fd

  • /data/data/com.runbeauty8/kl.txt

    Filesize

    437B

    MD5

    ffdff8c9345ca6451f9649e46ce50507

    SHA1

    da1b9f6e7383545774f16cbffc69f26c595fe0d2

    SHA256

    59c6aeb4e56b3d5ddf5cfeeed433d13453e3ac6815a6b04a20f8363cd76d3de4

    SHA512

    034c93df055111d003f5e7836555286385fa184bd478a6485b5c17491f5281c8652e2fd9e0fd19a9f2f9a5497e5b01176cb40799f4d887db53da4b4493d3d29e