Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    16-12-2024 22:07

General

  • Target

    c8447cc288f06fdfd2e889c545f90b0f15664594475144df33ae2b02e4bd93fe.apk

  • Size

    4.9MB

  • MD5

    bb130a164b2a71532f6b7872d133086f

  • SHA1

    7637060996efba7cb1c4fda0bd2af2a7cf3694c9

  • SHA256

    c8447cc288f06fdfd2e889c545f90b0f15664594475144df33ae2b02e4bd93fe

  • SHA512

    a7885b6219c03e07b483148bdcf9a581ac45302b9b1c8fab70e0ec814d1803876f3adb9c21db0ea63ad88d7615fda8ee871bf1804cfecb480a2245f743634291

  • SSDEEP

    49152:HYRsEXO2Eml3KhM3X5V45iS7xrGjr+6Q3vjVKScsBUfKCv+KlZG5eMPOvvlf8:4Rs4VFQM3Xs5iSRGa7VKDD+d4TvvJ8

Malware Config

Extracted

Family

octo

C2

https://904267265dba40e94bcdc57760fcaf11.shop

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.infinigru.police.phishingeyes

    com.cibc.android.mobi

    com.estsoft.alyac

    com.ahnlab.v3mobilesecurity.soda

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Signatures

Processes

  • com.notifierpush_com5
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4260

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.notifierpush_com5/.global.com.notifierpush_com5

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.notifierpush_com5/files/.s

    Filesize

    307KB

    MD5

    4e73947cabb5db3f92ca85004981b754

    SHA1

    6d9667fdb0280ed2dcb782b4683e422a51bdc601

    SHA256

    6db94232e756b90ed437f1bc87dc38cf20fb2e7c7a19a5e40c6c17254b7e234c

    SHA512

    be8b500a7070af1dfb53b0cf1a7b327dadc4e163a6dad905496ac228c58cd1ed87b054533917924455d35e9b300683ae33e1bcdd91935a5dbae1d693c3e13d69

  • Anonymous-DexFile@0xcb7f8000-0xcb87ba30

    Filesize

    526KB

    MD5

    fc7955df9b07d65fc5d24ee1551f12a1

    SHA1

    06530735c0c0a6e4040c5cf4afafed4724e98cee

    SHA256

    824c1b2a9bfd4538952927ca46f478d71b749686a26955e8ad99a8aab5f0cb93

    SHA512

    4b870e2f014da3d27b13045e6ed9d0a541525a028f883aa3f6e054dd64ebf5be18d468db26564a6d10ebe881534cdac0feaa193c21ea47ed69f238df96c48f1c