Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    24-11-2024 22:00

General

  • Target

    98f230005c02384d3b225e7c9739acbf7af9322d116ab25ca5f2da1edd4971c6.apk

  • Size

    2.7MB

  • MD5

    fe7cac3a6c422d2a0b8c395841655bfa

  • SHA1

    ea22bc374311e38d4de4007c3d0c90f43fd42533

  • SHA256

    98f230005c02384d3b225e7c9739acbf7af9322d116ab25ca5f2da1edd4971c6

  • SHA512

    89462dccb681752899a0362787825ca6592559c6df88367de949db6cba621090798c6544ca564880271380fc8ceddc9d8f84649deb44ae5e874709b42b6c1a25

  • SSDEEP

    49152:eGd6Kjcf1ObPyI4trAm8a8KLGBHzFOTkCMmn6U9BrVT9mDl8r601sS8IQB:e4FjEI4iZaUzYH99yIK

Malware Config

Extracted

Family

octo

C2

https://45.88.88.100:7117/gate/

https://45.88.88.100:8080/rootmd50ma/panelcgfuzwxleg9kdxnvy3rv/gate/

https://45.88.88.100:80/builderxxxzzz/gate/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.nameown12
    1⤵
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4942

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nameown12/.qcom.nameown12

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.nameown12/kl.txt

    Filesize

    230B

    MD5

    99f5462cdcaba7790b437fd645790126

    SHA1

    c2fcdac7f7a3ff7ceab4b0ed6380477aaad4ceee

    SHA256

    d6e23aa198341cf4d942bd7640a1e8cffc76a42882b1837ce9dbb3b4ecded544

    SHA512

    264a20384e7065ed9c9a92a9c07536cbb5c81fb232488dc8158ee7d5ba65ffa8bbbba9106a907e90b2d9ab3edbb50e9295471f141ec8fa1386e9a48232c4993e

  • /data/data/com.nameown12/kl.txt

    Filesize

    63B

    MD5

    acb58775d2dfdc577a8ede88492fd487

    SHA1

    20b23f647d5e773b599fc7179ba21f6d1bf399c8

    SHA256

    48d253148e2f2296245badf0df183057dd8e320af2a35a0d8e2e1f93d948909a

    SHA512

    beed991dd371ed53b55372d1421f907e33bd02b3776e3173b897b409597bcf897d27fb06f256664e029e6da289c5a2443942fbc4a2d36fa9b354cee2de62908a

  • /data/data/com.nameown12/kl.txt

    Filesize

    60B

    MD5

    4d8bbfed43802ead7d6c685c54c6df7b

    SHA1

    00ab5b276bcb7df5b4f3f5cfb3ac0af2a2e56e16

    SHA256

    433a1ba931ca5dfb70a1fd8fe482d48bc69c0c11d3560e5c165d93f2fe7dab4c

    SHA512

    1cc2fe7aaecbce298ab3102efbe979072128002229fb448275c1edb63d11d9cf49d9578259e44a7eeda316f770ac14cd6e4b9be9a8a88c543aa630ec35cad36a

  • /data/data/com.nameown12/kl.txt

    Filesize

    423B

    MD5

    8cbcc56405221dc627882f2cdc4fc249

    SHA1

    6cd9047e2827582e7e9bde0762a7ee07a1523ffd

    SHA256

    d99b77d75049753bdce43ab0e65d08a1a9e88a084711db7fbc48d48d4ee1cd9e

    SHA512

    b39dc0e8e0ef0b04cce96864394d498cf4bf57ce1e1233b9a866d9d33eec9666710a3bc2ea396e3e971f1f4d7e92445ca4355ca09855a415c3979f0ad0040f7f

  • /data/data/com.nameown12/kl.txt

    Filesize

    230B

    MD5

    8db988d4f7ada19ff5ac2f80b44906ca

    SHA1

    368be1863064527ef3cf4b6573ab8e30d29c1038

    SHA256

    6cd15d24b62f5daba050ff059c5c2ed3ad069639925c6025256cdb2fa9db31c5

    SHA512

    79ce4faa0636a1b37b866fd1ebc20b91b406420594e62f1865781c3b2228bb3130d2097053fe1b965ad0e092417d7b03557abbff3d6c45b1d418d397e8a51059