Analysis

  • max time kernel
    53s
  • max time network
    131s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    28-11-2024 22:01

General

  • Target

    a59e3cb601c3c40331d099a730b87ff4490320ca2dac082b17e080174f6b8b35.apk

  • Size

    1.5MB

  • MD5

    72b5f50a9abd687d8559746aee273aab

  • SHA1

    05f1c0c680b31c058405175dc3fee0d5d9c119bd

  • SHA256

    a59e3cb601c3c40331d099a730b87ff4490320ca2dac082b17e080174f6b8b35

  • SHA512

    788080697be54b06ea4b981889c0392bd3284878276ee2f93b0abee3e9ee0bcbba86180ada70e41ac7d42655aad60913229d0e7da58fbddcc36b46e167809d72

  • SSDEEP

    49152:/+zItAuwV/cf065lBOHmQZl2uumrldlXhg5Xl1b:wRuwFR657nQDLJr/Xg57b

Malware Config

Extracted

Family

octo

C2

https://pildirpirpir34.com/ZTZkODUzMTBjYTA3/

https://pidlirmidlir23.com/ZTZkODUzMTBjYTA3/

https://pigav233.com/ZTZkODUzMTBjYTA3/

https://tavaekemk42com/ZTZkODUzMTBjYTA3/

https://pifvafaf42e42.site/ZTZkODUzMTBjYTA3/

rc4.plain

Extracted

Family

octo

C2

https://pildirpirpir34.com/ZTZkODUzMTBjYTA3/

https://pidlirmidlir23.com/ZTZkODUzMTBjYTA3/

https://pigav233.com/ZTZkODUzMTBjYTA3/

https://tavaekemk42com/ZTZkODUzMTBjYTA3/

https://pifvafaf42e42.site/ZTZkODUzMTBjYTA3/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.gaveuse2
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4220

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.gaveuse2/cache/byzsdrmkske

    Filesize

    1.4MB

    MD5

    d8c9e829821488b8177d30384757f048

    SHA1

    716f4dfbe46347baf7188bd821ba0a9407afb538

    SHA256

    1f537fc474e1a612942d023c8074dded3c8845c12c279d1db78b9301ddd67862

    SHA512

    16dba2c6eebb261a6e895f7f6c7478806e63f221c3befbbfef3cc7da99bf73b9de924414a9df05a6b4aafeda0d7b6fe2021d513b4e998744deee360743aaabce

  • /data/data/com.gaveuse2/cache/oat/byzsdrmkske.cur.prof

    Filesize

    522B

    MD5

    fb3c88fcb0d404075b32d508339f46db

    SHA1

    9276da917f22a9485d1addd94b4753cb4882a4b4

    SHA256

    47804413ec7ebc83efceb97bcee0bf027d6bba4d87993ee714b847ddf2acbe20

    SHA512

    f94c8259991d9388adac14267aa30a57a5a0b5962f2d954b32e3829702fd679306bf8d7d03438f8ca54980b96bee6e82c04ca0f62827f655bc8aebca26903d46

  • /data/data/com.gaveuse2/kl.txt

    Filesize

    237B

    MD5

    d3f3ae9499ea5115ca587780561d1b5b

    SHA1

    0dbf115ce8590a1add3eb6d1e3ba38a91735af1d

    SHA256

    e44b3ec99fdce5a2b921db938ae42ba53b9114e01c8d544dbe631b84c0457046

    SHA512

    bb4598a377a6e0cbc79b7032c2bda0ee26f5f40cddcddfa6440d7275d78cfacfc3df6ab4e43c3eb31d49750e62b0ba4c38e4a76f96ae62312d4a8e2e58f81e6a

  • /data/data/com.gaveuse2/kl.txt

    Filesize

    54B

    MD5

    0e7207cabad17a7f3f1dd1f661516e9d

    SHA1

    da63838d775c2992cec8736cd1a6b985c1a43e4a

    SHA256

    c79eadbf1a15989219795e1bd9cd47f3417d17a3da25995d283f98260b384da9

    SHA512

    348a08f702de3541a3e2b184ecf509cb68a772b5668666189f47aecc26f741c0fb8df644a336116f16118ff6048edd8191bc1246263f76de04b505246e9e0f06

  • /data/data/com.gaveuse2/kl.txt

    Filesize

    63B

    MD5

    e90e8007fc2464b8d592c1d9fd9aa6ce

    SHA1

    00f141df0ca2abeb8e0974edd0f68a0d542a1b6b

    SHA256

    80334160882ee456936f8ad153beccfffe6524d1b54652b90c9850ffbc939c8c

    SHA512

    6ec3cd4be4bfba18526d378de6b33195e6c22ee614f190b102d3bab70eb975c541627a7f39520b1f79b16314bb447e392b336e92b65b4cb8afc76cd4d0154e56

  • /data/data/com.gaveuse2/kl.txt

    Filesize

    45B

    MD5

    f4ffc20aed632fad31c3931b922dd413

    SHA1

    8384ec9fd3d1dfbd03e29b97e5e2d9345ab750ca

    SHA256

    4868362b6d61119dcef1564b44e07592ecb675be38536b73d22f5491b173c46b

    SHA512

    3f2951425edf5ad17d7a44abd5d989bd916163c90faf21edc8125a2e91e2717e3d6ae18647bad18dc5be27fd51712828e3a090722b1485f7ad7b05c1a2052275

  • /data/data/com.gaveuse2/kl.txt

    Filesize

    437B

    MD5

    fb2a5a642ccab6a82c5c84cd21558d2b

    SHA1

    13491a5a17dd8b43f2d451838576d9d9935daad1

    SHA256

    3f3095facc99b114a582f0906e9def0bac726509ff66d5b61003ac869a4fa79e

    SHA512

    31ed26e526622b5219e256639ead1083f9e5bb390a8eea6ff9d4999a9a03571046276046351ddb981bc3950b9e92f1c9e019ca564a9b23e31586f155f2420a11