Analysis

  • max time kernel
    143s
  • max time network
    136s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    27-11-2024 22:00

General

  • Target

    5617835fd088571fce5f3ec31162f327fe4473db733d1c02a568c5540e683675.apk

  • Size

    1.6MB

  • MD5

    76083059951b001b2b26d6bab5f21dc0

  • SHA1

    16d730c396e465935c85bcefa18c5d3fb89d951f

  • SHA256

    5617835fd088571fce5f3ec31162f327fe4473db733d1c02a568c5540e683675

  • SHA512

    e59a55e328be293b5bde09f53503151ce496766ffeb5f39ff719853a589bca7286a6edb5d5103231dc0bf88d9c9cacfa4ca3c3b1e89d626663c562b891e23742

  • SSDEEP

    49152:JW8vna13lDTWMgBoqrnAtGj0zuCjKyJ71z909V:ZulDyMOjDzjG1Jf0L

Malware Config

Extracted

Family

octo

C2

https://roskingming3333.site/MWQxMmUxNmEyYmU4/

https://conmonroskos2241.site/MWQxMmUxNmEyYmU4/

https://roskifavvev25.site/MWQxMmUxNmEyYmU4/

https://ro5123rdcrosking3333.site/MWQxMmUxNmEyYmU4/

rc4.plain

Extracted

Family

octo

C2

https://roskingming3333.site/MWQxMmUxNmEyYmU4/

https://conmonroskos2241.site/MWQxMmUxNmEyYmU4/

https://roskifavvev25.site/MWQxMmUxNmEyYmU4/

https://ro5123rdcrosking3333.site/MWQxMmUxNmEyYmU4/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.heardshowkw
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4305

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.heardshowkw/.qcom.heardshowkw

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.heardshowkw/cache/oat/ogbyiydhwmqgdfm.cur.prof

    Filesize

    526B

    MD5

    5110652e1888d2ba0efbbaaeafe04e23

    SHA1

    19b037cae2962f47a98036f03243a2f5da9c20fb

    SHA256

    67be39c1c83ba22e6abb6e08caeb45bdb417440d921865118a4fe82a780df9fb

    SHA512

    c85621f24713f082949ac685dc18f7d15584e25fcdd51492bdb6f96e84dceb29de1eb99132307e6174d667d900f5858d520b7de45acef06e2c6a14590927eb5f

  • /data/data/com.heardshowkw/cache/ogbyiydhwmqgdfm

    Filesize

    1.4MB

    MD5

    8f98ba09c557005a0afcedeb660cf56f

    SHA1

    045d2fd3feb62f13a59ed6d41c3b395d1de8b50a

    SHA256

    31767fef80ec4e0d63c6426a63df76295a30f6896702f07c886ff2bba0deb770

    SHA512

    8f736d8cb1cdf97f052cc4fb32fa603b190da4d8fa464c9c3caad761a204db64ef971b232be177d6342119afc0b807c923ec653dcddfea9403cdfdf8ff75c49d

  • /data/data/com.heardshowkw/kl.txt

    Filesize

    237B

    MD5

    6e73885c35b8e4fae296f14f009d0456

    SHA1

    80b144251d6a3cfb1a23b6e4863d07492b7aa3cb

    SHA256

    625f17b44b16b901bc70711313c4f7f7197a3ef066f7987c7d90218e8a63b8e7

    SHA512

    a1a005f6a1ba05b6288394eff1fef285e9ea0b538c1bc25ae8bb0bc2e9faf9d9f94235bdaa30040cda9a459624fe613ded99f833aa8d5edbc6130bb906245a86

  • /data/data/com.heardshowkw/kl.txt

    Filesize

    54B

    MD5

    c6300dc03723e096c73a0844351f34ad

    SHA1

    5f6ac7bf555a565a9b5da5199c981a8d3e103ceb

    SHA256

    d8034d7d5a0a46de12988d6b86ad423222fc3cb84e7fcfca270c77c89d387e01

    SHA512

    948d8448556b7b2cab6f833c7cbc7c2f3e66d101b2540cc8d6457dc58c73fdf1fbae70dd63dd3197554c3524b17fefc6431cfcc6a2f08963ab493dc5a003a728

  • /data/data/com.heardshowkw/kl.txt

    Filesize

    68B

    MD5

    523f71ce61054e8a469a2f47fbf61822

    SHA1

    f009cfe3a8e7c299676ca8d734d29cd14073c319

    SHA256

    06011b4af5545a58bde2bd94977ca1bc290e5a7e89f374249358bff6c9d53c3d

    SHA512

    3efe38a296447a72dd8c4bee308d1582248f8e153354a0d0720a06a811315a2e96fd0ef1b7f57428f0f750fa9dc5ffd604751f5536fa65fd6fe2fb179046ae55

  • /data/data/com.heardshowkw/kl.txt

    Filesize

    63B

    MD5

    6b08a1594611a2b3f31ddb729c5a95f0

    SHA1

    2504c75af8a275cd1f247e9d99031a36ecab848b

    SHA256

    1382f8ea07027e3261de6846b051c9695580570f6ed20d5c13928e30efc86e2d

    SHA512

    1db5d1da45c2030a1e82114bc21570d75973933c65216e71044634242537ec27461aa0abd486b777224edeac787072b51d52c861aa090e634820f45cd8069261

  • /data/data/com.heardshowkw/kl.txt

    Filesize

    437B

    MD5

    bec2bcd3ab3f52b3217a1fde91c6875e

    SHA1

    2bb036eb2af5396a95388f7b849e82dec99e6355

    SHA256

    be534cfb3a1a1cac0a1d52644ec5114145d4d9098c1356abb203bffaa51a79aa

    SHA512

    4e4b30c3d61216f9fe8bf7f01aa300927a90e27b6ce8c0cc0f62bb0962d1f11ae152674a71fd34f23c72cb094c1484745606947b0e490ca81cdd66a60fd3e200