Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    17/11/2024, 22:00

General

  • Target

    dc72c6a6f656133f7464341466cbd66965e46ea545d6644d87df90ee34e67255.apk

  • Size

    2.3MB

  • MD5

    ccb4262679755cb606af2750984be35c

  • SHA1

    a32419c824a6c60f78ca941c36ed86ee823785a2

  • SHA256

    dc72c6a6f656133f7464341466cbd66965e46ea545d6644d87df90ee34e67255

  • SHA512

    cd7f7059325d213bb4f1639f200b822e718f53e7dc95754590015a14b5662feb9faf316cd31a4e49a523d0d5205ed4258725faba7c417a8ae4f552da0cc90905

  • SSDEEP

    49152:s8QQQQ+8QQQQNvC08QQQQ38QQQQl6u/RQFFhh6vn/m/LHwJQb8Z3Kfu9YSvhPcke:im7pQzhY/uLQJQoZ3izSJ3J8

Malware Config

Extracted

Family

octo

C2

https://populeryabancianimaserver.xyz/MDQ2MTZjMDhlZDQy/

https://eglencelikahramanlaranimas.xyz/MDQ2MTZjMDhlZDQy/

https://cizgifilmtutkunlarianim.xyz/MDQ2MTZjMDhlZDQy/

https://renklidunyavekarakterler.xyz/MDQ2MTZjMDhlZDQy/

https://animasyonvekulturhikayeleri.xyz/MDQ2MTZjMDhlZDQy/

https://yabancisanatcizgiustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cocukvesinemaoyuncular.xyz/MDQ2MTZjMDhlZDQy/

https://cizgidunyasindakiyabanci.xyz/MDQ2MTZjMDhlZDQy/

https://animasyontavsiyeveyorumlar.xyz/MDQ2MTZjMDhlZDQy/

https://sevimlicanlilarhikarakat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancianimasinemaustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatyaraticilik.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverkaliteleri.xyz/MDQ2MTZjMDhlZDQy/

https://kulturelanimasyonvesanat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancicizgianimasanatyolu.xyz/MDQ2MTZjMDhlZDQy/

https://eglencevesanatcizgihikaye.xyz/MDQ2MTZjMDhlZDQy/

https://yabanciveklasikanimasyon.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverdunyasi.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatkonusmasi.xyz/MDQ2MTZjMDhlZDQy/

rc4.plain

Extracted

Family

octo

C2

https://populeryabancianimaserver.xyz/MDQ2MTZjMDhlZDQy/

https://eglencelikahramanlaranimas.xyz/MDQ2MTZjMDhlZDQy/

https://cizgifilmtutkunlarianim.xyz/MDQ2MTZjMDhlZDQy/

https://renklidunyavekarakterler.xyz/MDQ2MTZjMDhlZDQy/

https://animasyonvekulturhikayeleri.xyz/MDQ2MTZjMDhlZDQy/

https://yabancisanatcizgiustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cocukvesinemaoyuncular.xyz/MDQ2MTZjMDhlZDQy/

https://cizgidunyasindakiyabanci.xyz/MDQ2MTZjMDhlZDQy/

https://animasyontavsiyeveyorumlar.xyz/MDQ2MTZjMDhlZDQy/

https://sevimlicanlilarhikarakat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancianimasinemaustalari.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatyaraticilik.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverkaliteleri.xyz/MDQ2MTZjMDhlZDQy/

https://kulturelanimasyonvesanat.xyz/MDQ2MTZjMDhlZDQy/

https://yabancicizgianimasanatyolu.xyz/MDQ2MTZjMDhlZDQy/

https://eglencevesanatcizgihikaye.xyz/MDQ2MTZjMDhlZDQy/

https://yabanciveklasikanimasyon.xyz/MDQ2MTZjMDhlZDQy/

https://populeranimaserverdunyasi.xyz/MDQ2MTZjMDhlZDQy/

https://cizgianimasanatkonusmasi.xyz/MDQ2MTZjMDhlZDQy/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.denizbank.mobildeniz

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.exotic.depart
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4322
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.exotic.depart/app_energy/WoAD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.exotic.depart/app_energy/oat/x86/WoAD.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4347

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.exotic.depart/.qcom.exotic.depart

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.exotic.depart/app_energy/WoAD.json

    Filesize

    153KB

    MD5

    e58cba8793e97d1bcf516e4aa85a5d76

    SHA1

    14b9df7759ffa3a068c787cd1b1cb77115b4e267

    SHA256

    b62af204fea6b67405dfac9187ddab686d55408e39199fbd2538401b4cc86fab

    SHA512

    063e2e16f809f555210fbeb2fde47654c343eca474a1153fab22c77d31036da0af1db2cb5d3245d1bfbbd5f1b0e6d0061f6c413936be70c22b189b8a4ccf52dd

  • /data/data/com.exotic.depart/app_energy/WoAD.json

    Filesize

    153KB

    MD5

    8f8bebfbd6e4cd11cbbf73b8eb77c142

    SHA1

    04f4c6226bd210c350e8519824f7cd79bbf214fd

    SHA256

    6e61a1296540ee2f97d70688b4f179c3fe57d6090afaa0de4c72765593eb5e21

    SHA512

    9bcee89f8c3e317114c07614d9aea6b71b030a5507dd44adfbac14a91c82be0fa5f3ba17c27c9547990a4572a21e648da2dd4309405770d2d26abdef98a91ea0

  • /data/data/com.exotic.depart/kl.txt

    Filesize

    63B

    MD5

    bc759f267f85d85acd71c10d5152bf3d

    SHA1

    aaea50cf115a472b1fbe1b95dc2429b2bf0c50c2

    SHA256

    d3be645517c1ac9b71ba6897b7cf0b1100a303fceb9968a2f093afea7a7e572c

    SHA512

    ed5031a8e34aa80d33281b5fc99643100b9e59f5d7333fd194faf96f6606d6d45b5192da1249f8dbf5887cb956a566f6e7d85c29bcfc3edf7931d5c0139852a9

  • /data/data/com.exotic.depart/kl.txt

    Filesize

    423B

    MD5

    f23e9218c5019e3dc528117072890b60

    SHA1

    72a3184c211e3d19200664569a9bd73bb2314b6d

    SHA256

    73f91fb6f4765c53ad91d45aa8607425d1037df0c7fc7e1465fc74434d708203

    SHA512

    a38c34ba3f695bd009a61753029f6df7eabb73bb2f6f6efa6076c05391f38657a0727ab2ba400e7147224e27923de6faa359bf667811e8757978dd496851144b

  • /data/data/com.exotic.depart/kl.txt

    Filesize

    230B

    MD5

    da285b53b5b50adf3ce7c39aba3aff4a

    SHA1

    19b0262fcc6eec5087b9689e703d34011a51939c

    SHA256

    e48be29b7d7ae4efcce0a4100681bbe8e1c52a4ce69908dec51d1434df53597d

    SHA512

    98b3d90d6cdcb4006937af798936d13b32ac7bd518d9effbbaee78440e8a57703a05dfe5347833b64fac305eb7ab3243f1612c3f66f8a88778029556f39d7f27

  • /data/data/com.exotic.depart/kl.txt

    Filesize

    54B

    MD5

    68588d9869fc4d5e72610ba9907f6c1c

    SHA1

    2560d1763d269d70c6520d61170aa4f1e51980ef

    SHA256

    e90e620889270b4c7f0429f7228a4795fdf0ae3f36829b79bdc0de517e529d5f

    SHA512

    5a6ae3073989f2d05e6aa9e971038eb07b89a0c4dd4c013b9e006545169788814de755a645c9ca44ae9b104ebb51abb0218470f738fe1d7c0694cfd2ca7646a9

  • /data/data/com.exotic.depart/kl.txt

    Filesize

    68B

    MD5

    205853779423e1cefcc81c70e71a23d0

    SHA1

    c519e5446e4d48eb1b0d88c85dd30187b472c092

    SHA256

    c5e293076a81c36fca8c90850d02b8b48222246b33df5dc35a5971af25bcf0d4

    SHA512

    dc2944bcfc4df0ce1203815dd4f25d5b314b7358c6e545b8ecf3e2fe9d65c58df254ec446e7ad77e51b3d7acd5749916e45d29d3aeadd7071221f90768fa56f3

  • /data/user/0/com.exotic.depart/app_energy/WoAD.json

    Filesize

    450KB

    MD5

    d021c6f1e98e10f76ef28b8c8a9d4716

    SHA1

    4ca61d200da5ab259c07da3cc6bdeed2a43179f1

    SHA256

    98ab483f580be3405efd6d59d0af2f413ab281c11e8f252326e21d3300883c27

    SHA512

    ef217b2c27bb9f32b1e77cd6e2689b389f9214a7bfeb73cd55ef9788ef4934071627cf72fc28031698da29d6b2f02d99e617f4651c7b266d41d20fef632ae149

  • /data/user/0/com.exotic.depart/app_energy/WoAD.json

    Filesize

    450KB

    MD5

    7ab975ff95a4c9cba3ca297700b9fbbf

    SHA1

    5b10fad3f875bc322d17dbb09637479861567eff

    SHA256

    9856fa4ae1bb070c6f60c98b3f966ad14de802a2b7942d5bbd0f8a42b2e47f27

    SHA512

    9c8b9dd85bb0b1adde5276d3befe9d7e5cb4957781b3b4ede82df893e420aa58ba1a7bdd20082704ca57b8fba2c240935fd1fc02066f6982fefb3ff1f9f97b33