Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    11-12-2024 22:00

General

  • Target

    ef8bf18796f9b33c8edaa3ae1f17a6047ac1e91e8f798c2d42634aca60980b36.apk

  • Size

    2.7MB

  • MD5

    936e7158f67fcd20679d82fabd3b00ba

  • SHA1

    04d1cb8796a42e474f3e5f57c88c55866e7ae22c

  • SHA256

    ef8bf18796f9b33c8edaa3ae1f17a6047ac1e91e8f798c2d42634aca60980b36

  • SHA512

    6719c4f90a39c5e8d5c8e1d112a84feec027a2ebacf1e6ec9d925675b3b6f18c9e36360fce298822b8dbe019b8d08d5c2d612cc0379f3081a0579e0c49783363

  • SSDEEP

    49152:ZYoQrw6Kjcf1ObPyI4trAm8a8KLGBHzFOTkCMmn6U9BrVT9mDl8r601sS8IQn:6oQrwFjEI4iZaUzYH99yIs

Malware Config

Extracted

Family

octo

C2

https://93.123.109.166:7117/gate/

https://93.123.109.166:8080/rootmd50ma/panelcgfuzwxleg9kdxnvy3rv/gate/

https://93.123.109.166:80/builderxxxzzz/gate/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.nameown12
    1⤵
    • Removes its main activity from the application launcher
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4331

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nameown12/.qcom.nameown12

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.nameown12/kl.txt

    Filesize

    230B

    MD5

    0b24ef41f93e24900fbcb822c75ab326

    SHA1

    76237b172df643a89fc0aa1239a9444551322d84

    SHA256

    fefd2cec9ad5414c9b6212b20cfc259e72f23227cac53d5946a2c4030cf9803e

    SHA512

    4f762a01e9cf82cf762264e61436a196a98089e3af5668dad36673a597949352cc5e3456a2de3e9d15b4994a5c94c1eeac13b6b3a1cd98f07661472976452e77

  • /data/data/com.nameown12/kl.txt

    Filesize

    54B

    MD5

    4c955557e62e89ec29a27e418bf5924e

    SHA1

    818af88fe329767851ae260225ad458924f5f3de

    SHA256

    e2d486426c004f86deeb219e4626f986684c6b17d8d46dd80885c1902e18f8e8

    SHA512

    3e2a60b2742d60ea2a4100baf29dc1d093fc5cf3e7c71dc7757e6dc3164fe57f2dff6334ba91acc26f2e1c84ed7daf4e64ad37843a31139e5d3615d19b069947

  • /data/data/com.nameown12/kl.txt

    Filesize

    63B

    MD5

    e7396689e3311f6c24aaa0642d0b715e

    SHA1

    e91de260fb61a2c9be11cf3b638c55f60908dcd8

    SHA256

    ace8a2b1c767380287274815fb7aa79eb28279e15f06a3e39f095ec14acb3501

    SHA512

    a0fc15e01b223c6b4bfdb84f48d64da61bfacd9bb8de71f65b4c2ba6accedc49bc329f8d975076852ac2b89b3d46143bd8bfaf3bae91191110f5430eaca1b721

  • /data/data/com.nameown12/kl.txt

    Filesize

    45B

    MD5

    5bb6efcb273941cebbfb0a808398a3ff

    SHA1

    5f524f1f93a259fd4735f27190a25ff559bc4902

    SHA256

    bc8e9253004e676ddecf03a9d2775cf4480c98636e7bdb7af6ac15e887b246cf

    SHA512

    ed0c41b1b78c97bcc079db9e8c86643903d8b7836681065177dcdc0151c897f51a4192cee2803a4dcd633cbb22d5e338b017069d36f9ea8b16d2d9d68ce46dc5

  • /data/data/com.nameown12/kl.txt

    Filesize

    423B

    MD5

    83269465f0116c27772c1754352e8f3d

    SHA1

    a04afdb2ada298bba5a56aa4a1a9aa9db89d6002

    SHA256

    0d281ac79b53669940446fa1b79e67b11bec13fcd67dac88dbeb727ee075a3e6

    SHA512

    c3a6966d64d09ccfd1e7dc30456c83a72bade82c23196be9d84fbd7c16c5937dacaa6f77bf3111e160390583f4fb58e521672faf51377596a8dfb0a649d09b94