Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    05-12-2024 22:05

General

  • Target

    bba03d1bee28cdf52559cf4ae5e2afd33d5cb90bbb683457fe494ec6338734af.apk

  • Size

    1.6MB

  • MD5

    c9d9e7edfea2dd77b939d3cdca53dde5

  • SHA1

    27a375cdbdb84b63a8c5629488eb056d1c64cc4f

  • SHA256

    bba03d1bee28cdf52559cf4ae5e2afd33d5cb90bbb683457fe494ec6338734af

  • SHA512

    a4bdd38f1c9dfa85718ff8785082c2c620f8ee4bb85aad094adea1a560f3fc826a96e504291ba4f3b636e03cc22ae22b8cdc80c700d3db69f07d7cc5f91925c4

  • SSDEEP

    49152:fkMDWGVefnqUdw3buFuUsX5r71Mot8KtKHc+JS6MBS0K2wD8WwKalKtKHY:zVVefqtryDYH1DtdMS6EdwAKH

Malware Config

Extracted

Family

octo

C2

https://hayatindonderlerikararver.xyz/MDQ2MTZjMDhlZDQy/

https://zorluklaryenicocugunhikaye.xyz/MDQ2MTZjMDhlZDQy/

https://yasamtarzdunyayidogrutani.xyz/MDQ2MTZjMDhlZDQy/

https://cikmazyollardaumutarayan.xyz/MDQ2MTZjMDhlZDQy/

https://hayatinhikayesipratikcozum.xyz/MDQ2MTZjMDhlZDQy/

https://yasaminkavgaveodulleri.xyz/MDQ2MTZjMDhlZDQy/

https://kucukengellerbuyukbasari.xyz/MDQ2MTZjMDhlZDQy/

https://zamaninguctusevinyasan.xyz/MDQ2MTZjMDhlZDQy/

https://gucluklertetekiseyaoyun.xyz/MDQ2MTZjMDhlZDQy/

https://hayatdersleriozetlemeler.xyz/MDQ2MTZjMDhlZDQy/

https://umutlarvesikintilarbirlik.xyz/MDQ2MTZjMDhlZDQy/

https://cikissizyollaryasadogru.xyz/MDQ2MTZjMDhlZDQy/

https://zorluklarveguzelliklerin.xyz/MDQ2MTZjMDhlZDQy/

https://hayatsevdigiolumsuzluklar.xyz/MDQ2MTZjMDhlZDQy/

https://yasambaglantilaryaratici.xyz/MDQ2MTZjMDhlZDQy/

https://cikmazlardayolbulanruhs.xyz/MDQ2MTZjMDhlZDQy/

https://hayathikayelerinikavrama.xyz/MDQ2MTZjMDhlZDQy/

https://yasanmisliklarvesiniflama.xyz/MDQ2MTZjMDhlZDQy/

https://umutvemucadelehayalleri.xyz/MDQ2MTZjMDhlZDQy/

https://zorhayathikayelerindenson.xyz/MDQ2MTZjMDhlZDQy/

rc4.plain

Extracted

Family

octo

C2

https://hayatindonderlerikararver.xyz/MDQ2MTZjMDhlZDQy/

https://zorluklaryenicocugunhikaye.xyz/MDQ2MTZjMDhlZDQy/

https://yasamtarzdunyayidogrutani.xyz/MDQ2MTZjMDhlZDQy/

https://cikmazyollardaumutarayan.xyz/MDQ2MTZjMDhlZDQy/

https://hayatinhikayesipratikcozum.xyz/MDQ2MTZjMDhlZDQy/

https://yasaminkavgaveodulleri.xyz/MDQ2MTZjMDhlZDQy/

https://kucukengellerbuyukbasari.xyz/MDQ2MTZjMDhlZDQy/

https://zamaninguctusevinyasan.xyz/MDQ2MTZjMDhlZDQy/

https://gucluklertetekiseyaoyun.xyz/MDQ2MTZjMDhlZDQy/

https://hayatdersleriozetlemeler.xyz/MDQ2MTZjMDhlZDQy/

https://umutlarvesikintilarbirlik.xyz/MDQ2MTZjMDhlZDQy/

https://cikissizyollaryasadogru.xyz/MDQ2MTZjMDhlZDQy/

https://zorluklarveguzelliklerin.xyz/MDQ2MTZjMDhlZDQy/

https://hayatsevdigiolumsuzluklar.xyz/MDQ2MTZjMDhlZDQy/

https://yasambaglantilaryaratici.xyz/MDQ2MTZjMDhlZDQy/

https://cikmazlardayolbulanruhs.xyz/MDQ2MTZjMDhlZDQy/

https://hayathikayelerinikavrama.xyz/MDQ2MTZjMDhlZDQy/

https://yasanmisliklarvesiniflama.xyz/MDQ2MTZjMDhlZDQy/

https://umutvemucadelehayalleri.xyz/MDQ2MTZjMDhlZDQy/

https://zorhayathikayelerindenson.xyz/MDQ2MTZjMDhlZDQy/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.denizbank.mobildeniz

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.nuclear.act
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4475

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nuclear.act/.qcom.nuclear.act

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.nuclear.act/app_entry/IKorMi.json

    Filesize

    153KB

    MD5

    1f1303c6fe000800bc9f34d784329a5b

    SHA1

    74159da8c3ac47b8e9bf3a7c301e933bd8f091d0

    SHA256

    0f5cabec7ce8ecfda98a40eaa05be963d6f5d9a1964482d5cb8f6f3d7097181a

    SHA512

    25d8c947b8f85b54805611621fc2097f4b625aa22685ab8281efab6d591fa067029b61ef710255e4411241e6d698afcbed70d5343a339c97f46f8b8966242e20

  • /data/data/com.nuclear.act/app_entry/IKorMi.json

    Filesize

    153KB

    MD5

    54547d446db13692a690840c5b98e139

    SHA1

    15cc78e2bfbf35ef0cda9593dd1b64add495eecd

    SHA256

    20c003cd0e8ec652e249d265e6c48ea611da1e6d49948f03a28fa6bbb547018d

    SHA512

    84caf7fe39732974cec931ab47891f83feb5f9f6cd0ed8f670024e1d6b6c4388f093d7b6415de85671e35ecfced88864d67961c3fa3e14ab26b629cfe12bbd80

  • /data/data/com.nuclear.act/kl.txt

    Filesize

    230B

    MD5

    33d3153513cf379f3349f144c8c92f11

    SHA1

    7392c3a2f14480766a9f8d6a167f38ca3937e6bf

    SHA256

    0fbfacdf70990f97a2f8d1c43ee7ac5ae65d9431777803c42997f3fa1b6f6649

    SHA512

    5d0f131e80ad98524f24aa035ba632365ab6f46a5b2d78992107484d6dcf0919c181d97453197d5ae082080617a75f22c7c334b48725eb29340acb420171e85d

  • /data/data/com.nuclear.act/kl.txt

    Filesize

    63B

    MD5

    4200e07d3b4d0b7a5c3233ffed7c8812

    SHA1

    f9a1e26ae70af432b5e8c3b8052e63074862dd6e

    SHA256

    c23b2e75185e5e2c7ba93ea2f5ba5ff3d3757ec013c0b625765e3bd4f73b54b5

    SHA512

    482675e99e766da5c60b86775c4eaf66ee7403ed7d53ce0394eab4d5b2d3a21fd99dabc0f4e142d69eeb5e27e096e7ca6e53ec6b06998559ea8811e5c3c1d4ce

  • /data/data/com.nuclear.act/kl.txt

    Filesize

    68B

    MD5

    0d9a8c95ece937a0ac58188d66b3cff1

    SHA1

    45ef59a97e1b8b1f90b10a35d502a92349e97975

    SHA256

    01c1238df4f511fb23ac6552068783a205e7ea49fbc8ae53212a629ca28ceb5f

    SHA512

    55ab4462f14d1c2dd8f78b0443df33c391b3d2d855bdebe6686dd57dea3fe5b732ff870ebf21ab3cfb52e2690834f5763cbaec8249c770eb6bcc84ca45bc53fe

  • /data/data/com.nuclear.act/kl.txt

    Filesize

    45B

    MD5

    0ed2f821d9601f321bb22d10dd59d404

    SHA1

    bb1c01fb4165c27967d159741e10a71580ca8f4d

    SHA256

    78ac55f6043de38db8b546183a47e8fbba70698d4e7a634b2d8ab492f32876e7

    SHA512

    1e1284d9dab865627cbdaf9104089fff531826a829fd447ee417e2a90db0586db32d4f522fcbad275bdfbba48c0009f4ee3ecce98fdfb21a60ca4b4d599d1341

  • /data/data/com.nuclear.act/kl.txt

    Filesize

    466B

    MD5

    151394c4cb1cc71f6636c1ebabda605f

    SHA1

    717f7a0d90d3a9999257da860421da1570871dd6

    SHA256

    825b7acc46d7fe4a1f6e2b2aba739313ef934f102c9e6070ba99d6c8795cb9f4

    SHA512

    c88c7d8f33316d57c5f17b0d6d432f23f0a4c994dad779779534d33a39a2361ed4071be6a08e3b85dfd804449e2cef1664e42eab89e8f49ee225760743326472

  • /data/user/0/com.nuclear.act/app_entry/IKorMi.json

    Filesize

    451KB

    MD5

    2b4e537726e35632c3803124acf85534

    SHA1

    e2568feba76753d44ad5569e8ee47fbb9b8b827d

    SHA256

    e0f8d9bbedf35954bfd023bf32896773d777b98746df588c2294cf96b3a8ea77

    SHA512

    3e0ae259b14b99388c5920fe9fcfc639eda3f16e4c01b562a684ce634ca32adb4ff40950aa06d9f7841820d2959d38aab47b10f6e665a2fc74f063d9d3398cee