Analysis

  • max time kernel
    147s
  • max time network
    132s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    17-12-2024 22:07

General

  • Target

    57d0e1ccfda9c73e7bd4d8a1ed520882f193250c363cfbd8c024560d84cb0a92.apk

  • Size

    1.2MB

  • MD5

    f8936ce158e69f8daea71139e11aff91

  • SHA1

    fc8a0e18b5fc16fea957d5e092c562287f525bdc

  • SHA256

    57d0e1ccfda9c73e7bd4d8a1ed520882f193250c363cfbd8c024560d84cb0a92

  • SHA512

    3cc799d4d190d99aa6bb8e561ce4ca18dee5ffb8f2f82f160aca68df6f070022d1b91a0fc88b5278c4bc218756d31e203874fa7f42f67dc34642d308b19b2f3a

  • SSDEEP

    24576:dzBeZptQB+5zaN4OvM2JX9wOYZVDD/qGknW6KlMeSUgzShEUJ6avbQ:dYptQBWUN47D/qheSxzSuUJ9TQ

Malware Config

Extracted

Family

octo

C2

https://hayatvesanatguzellikduygusu.xyz/YmJlYTFiODdkMjcz/

https://mutlulukvesessizlikyolculugu.xyz/YmJlYTFiODdkMjcz/

https://yasamvesahtekarguzellik.xyz/YmJlYTFiODdkMjcz/

https://sevincligunlertatminkar.xyz/YmJlYTFiODdkMjcz/

https://dogaltatvesanatyaklasimi.xyz/YmJlYTFiODdkMjcz/

https://hayatlarinhuzurvesessiz.xyz/YmJlYTFiODdkMjcz/

https://keyifligunlerinfirsatlari.xyz/YmJlYTFiODdkMjcz/

https://sevgiiledoluyasamyolu.xyz/YmJlYTFiODdkMjcz/

https://sakinlikvehayatderinligi.xyz/YmJlYTFiODdkMjcz/

https://sanatvesanatcihayatlari.xyz/YmJlYTFiODdkMjcz/

https://ilhamdolubirhayat.xyz/YmJlYTFiODdkMjcz/

https://zenginlikvebasarihikayesi.xyz/YmJlYTFiODdkMjcz/

https://kalpvesanatdostlukhikaye.xyz/YmJlYTFiODdkMjcz/

https://mutlugunlerinyasamayolu.xyz/YmJlYTFiODdkMjcz/

https://yasananhayatinduygular.xyz/YmJlYTFiODdkMjcz/

https://dogaylaisbirligiyolu.xyz/YmJlYTFiODdkMjcz/

https://hosgoruhayatvekultur.xyz/YmJlYTFiODdkMjcz/

https://hayalguclesanatbaglantisi.xyz/YmJlYTFiODdkMjcz/

https://sadelikvehayatfelsefesi.xyz/YmJlYTFiODdkMjcz/

https://dogaldostlukvesanat.xyz/YmJlYTFiODdkMjcz/

rc4.plain

Extracted

Family

octo

C2

https://hayatvesanatguzellikduygusu.xyz/YmJlYTFiODdkMjcz/

https://mutlulukvesessizlikyolculugu.xyz/YmJlYTFiODdkMjcz/

https://yasamvesahtekarguzellik.xyz/YmJlYTFiODdkMjcz/

https://sevincligunlertatminkar.xyz/YmJlYTFiODdkMjcz/

https://dogaltatvesanatyaklasimi.xyz/YmJlYTFiODdkMjcz/

https://hayatlarinhuzurvesessiz.xyz/YmJlYTFiODdkMjcz/

https://keyifligunlerinfirsatlari.xyz/YmJlYTFiODdkMjcz/

https://sevgiiledoluyasamyolu.xyz/YmJlYTFiODdkMjcz/

https://sakinlikvehayatderinligi.xyz/YmJlYTFiODdkMjcz/

https://sanatvesanatcihayatlari.xyz/YmJlYTFiODdkMjcz/

https://ilhamdolubirhayat.xyz/YmJlYTFiODdkMjcz/

https://zenginlikvebasarihikayesi.xyz/YmJlYTFiODdkMjcz/

https://kalpvesanatdostlukhikaye.xyz/YmJlYTFiODdkMjcz/

https://mutlugunlerinyasamayolu.xyz/YmJlYTFiODdkMjcz/

https://yasananhayatinduygular.xyz/YmJlYTFiODdkMjcz/

https://dogaylaisbirligiyolu.xyz/YmJlYTFiODdkMjcz/

https://hosgoruhayatvekultur.xyz/YmJlYTFiODdkMjcz/

https://hayalguclesanatbaglantisi.xyz/YmJlYTFiODdkMjcz/

https://sadelikvehayatfelsefesi.xyz/YmJlYTFiODdkMjcz/

https://dogaldostlukvesanat.xyz/YmJlYTFiODdkMjcz/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.onion.actual
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4318
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.onion.actual/app_drip/nc.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.onion.actual/app_drip/oat/x86/nc.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4345

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.onion.actual/app_drip/nc.json

    Filesize

    153KB

    MD5

    90c12d3d6c0bb009d207ad13f2a5b889

    SHA1

    e885c194f30882767ea7863006293822a9636167

    SHA256

    0fc92dc1ed69adcae49e825526cbb3d22389918d4620297c692d81f768dd09c9

    SHA512

    8f9ccd77fbb70abbd2e4a4dd1f020eac2d1f420eef32f36e3b3f8ba656ee0fce08a28537b98bba4075006351438944b7b7c1cb12616ede7e5a9db29ab3cb5082

  • /data/data/com.onion.actual/app_drip/nc.json

    Filesize

    153KB

    MD5

    dc3dd78aa20bf69891870885922d8363

    SHA1

    c776724e18b2074259bec09c547888615cc88eba

    SHA256

    45c0217d32f6d52aaef8f8a84efe256ede61e960c96bb901d2d2d7de458b3159

    SHA512

    ff5586a17c576b6119df0dadde212a7a69512db56a44d493c3f0a15c62c0193ff97720247a211d83472048ad900153b8d305e1f67802619c18ccf77eab3852f2

  • /data/user/0/com.onion.actual/app_drip/nc.json

    Filesize

    450KB

    MD5

    5a6408496c40c855ffb175ee9b46067b

    SHA1

    08937f416fbd44b36b4fa92ed9eae3308cef3090

    SHA256

    0e5e221c078e2cfb2a1325a36caf92e3b88ab550cc465d8f99b6c37d163cb5bb

    SHA512

    e9d6850fe218dd3c28ce5ebf77cea6b47950242830f395eae97569a15da126c8b48142183fd884fa88f26bc44f506d63f36b4864f88f123e3c5cea175cbf6685

  • /data/user/0/com.onion.actual/app_drip/nc.json

    Filesize

    450KB

    MD5

    f3b910b90d0e82568be2ddba1a788f76

    SHA1

    4889edc58d7146aa68ea326678bb97579d82a796

    SHA256

    109460adcd57ecdc2a258fc9134b624d73d0b787e3891e54afb79e9c6910516d

    SHA512

    8e3c52d959a8b82a61ad7a5cc21eb4ba40621647399d8b41ef587bd0b269776437f2d4c9f477522b3c3d51a65cd6fa6118aef21211e04d14b3ed9a84ee9281ae