Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    17-12-2024 22:09

General

  • Target

    026f5d456e432607bcaff0830eaa923293caf3c977227d2a2b0f52fa6fce777c.apk

  • Size

    1.2MB

  • MD5

    9066ed7106ef4a66c067f276b28b4ec9

  • SHA1

    b5eb5a7b344a306ce9746ed8cd6ae5736a5cbdd4

  • SHA256

    026f5d456e432607bcaff0830eaa923293caf3c977227d2a2b0f52fa6fce777c

  • SHA512

    3dc757586abed302514b4083d7a6d687b018fd069463a7fb32f4c38698cc53be3b0e48948543b2b94f8e1360886d3abf1281c6002ea07a677f99408c1b8f0863

  • SSDEEP

    24576:fEvJ1EW653rCLyy809ZVHMD/iZny5NzRV17eAxdXj4/50YLfQcR3:Mh1E13+X809MD/iQ5xRH7eAxNj4/BLPZ

Malware Config

Extracted

Family

octo

C2

https://moneyeuroland.net/MmI1M2ZiMGRmODEy/

https://moneyeurolandbebek.net/MmI1M2ZiMGRmODEy/

https://moneyeurolandscans.net/MmI1M2ZiMGRmODEy/

https://moneyeurolanddelicim.net/MmI1M2ZiMGRmODEy/

https://moneyeurolandbabis.net/MmI1M2ZiMGRmODEy/

rc4.plain

Extracted

Family

octo

C2

https://moneyeuroland.net/MmI1M2ZiMGRmODEy/

https://moneyeurolandbebek.net/MmI1M2ZiMGRmODEy/

https://moneyeurolandscans.net/MmI1M2ZiMGRmODEy/

https://moneyeurolanddelicim.net/MmI1M2ZiMGRmODEy/

https://moneyeurolandbabis.net/MmI1M2ZiMGRmODEy/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.needso13
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4255
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.needso13/app_member/BEuGX.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.needso13/app_member/oat/x86/BEuGX.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4281

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.needso13/app_member/BEuGX.json

    Filesize

    2KB

    MD5

    133581bc8a91e45e0775835582be098b

    SHA1

    591604296c28c0873d9d2e94220860687e2a0d16

    SHA256

    f0fef5f675e17d708a505f111d5a6891827ff80ff2bfd8c9afe20f6ccd4423fe

    SHA512

    12a622494ae952a85fac59345d0bd86020650b219d3233ca5694598d2e07178c74fa9ec68933afb517b43dbd31f169e04245b03b45ecca6101131ea1f53c973f

  • /data/data/com.needso13/app_member/BEuGX.json

    Filesize

    2KB

    MD5

    37c5267c13a928d7260029d209bc9011

    SHA1

    a0551b0dd1b5953dc7ab490e0115c6f06084a288

    SHA256

    0a58322b4e9e1d5b449b91a40bc378ed0ba9203e56e2bbbf53f45ea356f2bb99

    SHA512

    de92c0f2b52d24a3e4128bb7e3c5631532851f5d262be980faec95673be8c036f35ef8d61a2aef4e68da67959105bb410df81ecabf9d42ac2efca9f37dc8fc7a

  • /data/data/com.needso13/cache/lhekv

    Filesize

    449KB

    MD5

    e7bcfef2dd87f8e02693a14d25f382b8

    SHA1

    5e5505499ed259a70a13289caece30c4374bf7ff

    SHA256

    aad1f431615fcea3531541852e299afc2f6b6ce25f22bbae7d09bab97a40e455

    SHA512

    a5df6b8cf7ee2dd521896afd79bc2f6d79b73a108ca033e89ac57169e844fe85574d176e6b4239da50c9e14270f106a1761d8be7120903c0bc193cc11e76dfcf

  • /data/data/com.needso13/cache/oat/lhekv.cur.prof

    Filesize

    461B

    MD5

    35cc47fd13a9e7662bffb2f1c2e21caa

    SHA1

    95658740e656d4ed9dd078c5703579c123c85d2a

    SHA256

    2065dff4837133fa0b118f4526551190101b82325143349ff0ad443e9a1da26c

    SHA512

    b34ddddb46543a6ef9fc38072d836fab8b7633cbf1e3e2d45247577dfd455c1d92d4cab136fc8b6f60a6aa42375f8f3a4a1e753855172026e0da77f0092b50f1

  • /data/user/0/com.needso13/app_member/BEuGX.json

    Filesize

    6KB

    MD5

    35d542460c727cb485be8d97b5ca324e

    SHA1

    08208cc8c4a0add519da5a8368363be118b79f03

    SHA256

    05cab8e7ca85022bd4c3008d7cbf27bd2460922896be94c0c1ef41cc554bedc3

    SHA512

    3d3f39c5d91487ed8f500b231279405a4a8f2b2dd45f5f7f70e2ab9722a3ba6a4fc9c2c61306b9cb27eae319e3e829f1aacb636468c1d4907c06069b966fe47b

  • /data/user/0/com.needso13/app_member/BEuGX.json

    Filesize

    6KB

    MD5

    1c4bef0640847bd386a2686981dc4e4f

    SHA1

    bd329e6364c21d0ced789a235257305b30c53027

    SHA256

    adb72b37d768af132576f09b471e04b443dacb00ef0dc943f15bbfbaddfdc069

    SHA512

    ae25b66dd8ff02ada92840d0745a8e5e15cc729c435cd13363d7dea1ae3641a3c972b8a2adf4ba44ca86fdcfe8180952d130bc065c24b03629376c6396ec2d73