Analysis

  • max time kernel
    146s
  • max time network
    140s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    25-11-2024 22:00

General

  • Target

    4c61f7f19d1ce095a8454cbe04647392493af3149ea4ed5b770ae7832ac1deb2.apk

  • Size

    1.6MB

  • MD5

    cdb450cce4672d83f148bb2eea345890

  • SHA1

    7744241639349b050efbfef5d6fb447492e96409

  • SHA256

    4c61f7f19d1ce095a8454cbe04647392493af3149ea4ed5b770ae7832ac1deb2

  • SHA512

    2af9dab168f0d32f78b8ad4080686e4d84f2f06a359f403c33e3877a3150c21ee20a3ad56b3d85524d17800dfccfd72ad69c883e87dabbd646d23b359d5b881b

  • SSDEEP

    49152:vK09kuETDdoD1b0/zUfYKZBAXvazGj60Ha60:TDMDeDu/z2/70izG20N0

Malware Config

Extracted

Family

octo

C2

https://pildirpirpir34.com/ZTZkODUzMTBjYTA3/

https://pidlirmidlir23.com/ZTZkODUzMTBjYTA3/

https://pigav233.com/ZTZkODUzMTBjYTA3/

https://tavaekemk42com/ZTZkODUzMTBjYTA3/

https://pifvafaf42e42.site/ZTZkODUzMTBjYTA3/

rc4.plain

Extracted

Family

octo

C2

https://pildirpirpir34.com/ZTZkODUzMTBjYTA3/

https://pidlirmidlir23.com/ZTZkODUzMTBjYTA3/

https://pigav233.com/ZTZkODUzMTBjYTA3/

https://tavaekemk42com/ZTZkODUzMTBjYTA3/

https://pifvafaf42e42.site/ZTZkODUzMTBjYTA3/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.doormeasuref
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4263

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.doormeasuref/.qcom.doormeasuref

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.doormeasuref/cache/csilybedqopw

    Filesize

    1.4MB

    MD5

    5ec957704831df0372a14000fe23312a

    SHA1

    a696dd9355b808b69b5a8f609da59bb0d0dc51cd

    SHA256

    38a85b7918d99498e0c342b33403601b8f9a093f9ae7f6aa232363ee290f0d42

    SHA512

    a5bc18026142f450fb3a66d218317c327961e932e43ac85e73a2c77e39c6ce9cc3b052f2f66943727620ef2184936e052d7987523d19d04f8ea84b71f363493d

  • /data/data/com.doormeasuref/cache/oat/csilybedqopw.cur.prof

    Filesize

    519B

    MD5

    1777e73d3ff598ce1094e398eeb43fbe

    SHA1

    da6e07561784a56ae7154292f88b306f52930856

    SHA256

    6b4797607e7655c2ab95c08a617348de1feb205a4f54a0d12cfdb6d4a83931e5

    SHA512

    fe43c387401108a4090b728cf535f7199a4d1ea0423d9a49600b1793eff2cbee1aa6197548d512fe8720ce93e276075437c020e2c9c9c947b97eb9538b993880

  • /data/data/com.doormeasuref/kl.txt

    Filesize

    237B

    MD5

    1172069f4986d5449b3c286a09d903f0

    SHA1

    449518f873e02d6bcda6763d837add178d38d72f

    SHA256

    261e96cb220ff6474a713e214e07cca1bb5104dde1d168044fb058771bf0eaac

    SHA512

    98b8dc604034c02d38f4ba2e4b4f7f181c55a324aca9de1b7247d0b4d25f464856ed92b90f1fc4d900ad606de4059133ace1cb5f0c249d0839afe33aaf9f4827

  • /data/data/com.doormeasuref/kl.txt

    Filesize

    54B

    MD5

    08de2452800f9a7ac124de47092f06b2

    SHA1

    ccbb40ca257c89773c241655c3014b57c54605c7

    SHA256

    ee19a2488d89b857d30df199ca9a04030d7fa0cc3a240e16c8ebc91669e1d0b7

    SHA512

    1636889b60d06e110ef40ba794418e156fa76edaa3b131f76a761ce1261ad2ac624be5dab367d11e533e53a9dacf3f88f5bd4c7bea694cff69747d4891aef452

  • /data/data/com.doormeasuref/kl.txt

    Filesize

    68B

    MD5

    3394404453e3de484770e3350e4342bd

    SHA1

    52e3e218147b191f95c34e26b2b049ab6c7cda77

    SHA256

    df58fad287cce225401d18d196d2f495369d0a9871d335f3ef73f93eea3be417

    SHA512

    4108ed00140c938322664eea7767f8ae9308e5a9096f766f1a7c83469594b48a3537722007c3d6333202edd7f61be6883cc4c7e9fb54579287b302a8b1fc74fa

  • /data/data/com.doormeasuref/kl.txt

    Filesize

    63B

    MD5

    25c86bbd5095a0f4f134276696d0f913

    SHA1

    0f6fe7778cb59f7b95226fd3beb3a1f4300c04bd

    SHA256

    5d0d5bb6c29ed0dc3612cf3510ac7d28d6c42007391a2055e15311812a6b4663

    SHA512

    eaa59a8177e8d6193731d2cdac901652e80e9ebb20d7b667467791ab3adfc1112d555f0c0b42036b6341fb914d9bb72892f4f636484d3cddabb2ec552e35163e

  • /data/data/com.doormeasuref/kl.txt

    Filesize

    437B

    MD5

    e774ed9f668707b24a34a8f087f6838b

    SHA1

    d9dad6ec03256e41f07e07d2bfc6ec8042b4fa19

    SHA256

    1d1bbc87df6696e46650e0141f743d34b57635d1aa513cfca1c98a6f7ead1ef9

    SHA512

    3eead730a35de5d9142808b1ae55683c055d196450e411d55614630269c71d510897a6c7c4c26ddfa1a2948dcc2d017ca18dabdc879eb76d6da6408f4fabdb42