Analysis

  • max time kernel
    146s
  • max time network
    139s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    06-12-2024 22:01

General

  • Target

    5b5265f2d0ca0374297485f80f6633db8d54c4a729bdaa39b48ef687651d1ddf.apk

  • Size

    2.4MB

  • MD5

    e91c0e6c6f2854800e71b1cbc56bacfb

  • SHA1

    65a0a496af13218eb3b9f4745ac4c2144c459eca

  • SHA256

    5b5265f2d0ca0374297485f80f6633db8d54c4a729bdaa39b48ef687651d1ddf

  • SHA512

    6240f8c66ce2d1bdf9a02ea39457fa44c465432bc595bbf7a70b457138890a50460e30cf7369f0d35ac96fedfe86f4941dffc692420022fcabf959536a1ab450

  • SSDEEP

    49152:maudEEzv4IJdXfyuStJdvyvqUEFqN+MXzLkik3dMkZUxxULH:y/quhyUEAN+S3k535ZSULH

Malware Config

Extracted

Family

octo

C2

https://weiston12858yw318.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3182.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3183.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3184.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3185.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3186.com/Njk3ZTc3ZDVlNmJm/

rc4.plain

Extracted

Family

octo

C2

https://weiston12858yw318.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3182.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3183.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3184.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3185.com/Njk3ZTc3ZDVlNmJm/

https://weiston12858yw3186.com/Njk3ZTc3ZDVlNmJm/

Attributes
  • target_apps

    at.spardat.bcrmobile

    com.google.android.apps.messaging

    com.samsung.android.messaging

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.commonideawym
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4257

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.commonideawym/.qcom.commonideawym

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.commonideawym/cache/oat/wvwznqnkfwnk.cur.prof

    Filesize

    530B

    MD5

    eb3bcda547363854ef977735ebf02d72

    SHA1

    b732625db3af4f2de2edf6c90927b323f3f10979

    SHA256

    348636606ce556e33639454ffed11589b689efa43ad069c23339afb3c0403e56

    SHA512

    8fdefeac196e780e377e6274aa93b4a25254d919184ad62b8947a342078766f585462c482bf1e858e7d4e2720c87a49dceaa5054c9cdf1ffdf135f62054c3fa9

  • /data/data/com.commonideawym/cache/wvwznqnkfwnk

    Filesize

    2.3MB

    MD5

    291b43e9dc8c68cf9b25c5ba358edf3e

    SHA1

    587d68b5f79ffcf60c58fa17d6207a240a966e38

    SHA256

    0b728ed3eb16796a4d0f8b205b180ad01adee737dc070a85fd1107d4abcdc8f9

    SHA512

    23e4d6fa61bdeaa420659796275778d46b1320d966609ea870574d129f4edc0c5c18a5c76c44babde89fce9f287e607303ab3bfcfd24dfedf30c4adfb9307c4b

  • /data/data/com.commonideawym/kl.txt

    Filesize

    237B

    MD5

    4d1c5963a1148dcea76f992efc08787b

    SHA1

    fad5169bc819d0be59baf354f805410133c7f5a2

    SHA256

    69ee9a6aa4b9bd4deb48ef7f262b2311fc66f2431d239063a853afe246e277c0

    SHA512

    57af1d3602cab53a0d1c192d45bfeabdbd6e5f563cdee283c11181e25dbdb735ac9c05f4365aaee81f839b8cb7e6cf589bd5cbd4b2e3a55ffe8c13e53bb59dec

  • /data/data/com.commonideawym/kl.txt

    Filesize

    54B

    MD5

    d328b78d11dd312dcd3e751148a0369f

    SHA1

    a3fef1955e8ef933b34716b16ed03003e2755298

    SHA256

    5c32c62f772c6d67425337585ba0cdc5493c85f7e2a06a8cc050371962a244f0

    SHA512

    de66878e3b2c067b748d457af954f50b34401c5067b6f0982e29fc0d77884db55917a07e8d80adc740058850ae003e22225dae1ce80d2c04aa48539ec5042923

  • /data/data/com.commonideawym/kl.txt

    Filesize

    68B

    MD5

    ff242cc27446838dda6341f516d0baee

    SHA1

    b9d1fb4f5f97874fe56856b0685ce358286e036a

    SHA256

    d1bc7ef2a68faaacdf34f0362aa958ffd88411386e599e7561ca7af075dedf6b

    SHA512

    582e7f890b5e46e71333200a6a5df9603797ed151a3168ef423b1ec857462a896bef663474b896760eb0c48ab02ce9b54328bda6d6d39e7e861b98e81b5f6b94

  • /data/data/com.commonideawym/kl.txt

    Filesize

    63B

    MD5

    294a4d5b312bd35cd52eccfd16ee737e

    SHA1

    66f848b2b3ba5f7e0f1d8d3e49ea599c6362ee18

    SHA256

    76fe919e821cf297b1ad16634a7ac895ed1a7ba1776a1d67f4df32d0fbef4ad9

    SHA512

    c48cb645d832d4375c73a8022edb3450610beb3432d8e34a4911a610b613c2f2e5059a68116021647005e0b5128c8d538e527c92da8188b9bb24c0bfc68a94b1

  • /data/data/com.commonideawym/kl.txt

    Filesize

    437B

    MD5

    9c6431eca66a3349937832683671b102

    SHA1

    3df91b678ae9c7b2c8aa589f0524b5f8c5f139aa

    SHA256

    418e87ebf8b75e992f71ef42e7b94f48c984eb1660acd5605187f6210cb4a8dd

    SHA512

    3153024ec574ff220b1c179a8f7f5c8cb46a1a4dfa1bcfeb1d66425532a0504930de565298193b01dd11c1412b21168817b08c6c22c8df57233e86a6866e8a1d