Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    23-12-2024 22:04

General

  • Target

    121469eca1864d681f5981c48f734dfe4c897f8a1a259b2ac8b1e05f1e8706d8.apk

  • Size

    2.1MB

  • MD5

    7a6311e8a24165f05e6c32cf3f9a4709

  • SHA1

    048e660cc92abfd22ccd1adc074ee50ab999594c

  • SHA256

    121469eca1864d681f5981c48f734dfe4c897f8a1a259b2ac8b1e05f1e8706d8

  • SHA512

    33bd4c9ec0b91ebfb656a6b631671c5444830c656db02fdecfe9fdfb2d3d76a7325d4256324fad2a9faf25e0c50b43e715886192356b499c564023c53b5020e6

  • SSDEEP

    49152:RMNpuwqk4eowx2neEzQTGjRHa7iEQyKk5S6f/Hm7hq4sxX9fY1A:RMNAre/QnvETGjR6OUKURfCq4O9CA

Malware Config

Extracted

Family

octo

C2

https://karateustalariningizemlisan.xyz/MTk5MTQ4ZGNkMDBi/

https://karateyolcususamuraidurusu.xyz/MTk5MTQ4ZGNkMDBi/

https://karatefelsefesininizleri.xyz/MTk5MTQ4ZGNkMDBi/

https://dojovekaretekahramanlari.xyz/MTk5MTQ4ZGNkMDBi/

https://karatesanatvesavasustasi.xyz/MTk5MTQ4ZGNkMDBi/

https://samuraivekarateduruslari.xyz/MTk5MTQ4ZGNkMDBi/

https://karatedoguveteoribilgileri.xyz/MTk5MTQ4ZGNkMDBi/

https://karateantrenmanvesanat.xyz/MTk5MTQ4ZGNkMDBi/

https://karetecininkusursuzvurus.xyz/MTk5MTQ4ZGNkMDBi/

https://kareteharaketveteknik.xyz/MTk5MTQ4ZGNkMDBi/

https://savassanatlarinindunyasi.xyz/MTk5MTQ4ZGNkMDBi/

https://karateustalaringizemlibilgisi.xyz/MTk5MTQ4ZGNkMDBi/

https://dojoyolundagecenanilar.xyz/MTk5MTQ4ZGNkMDBi/

https://karatetarihvesanatustalari.xyz/MTk5MTQ4ZGNkMDBi/

https://karateustalikursunumetodu.xyz/MTk5MTQ4ZGNkMDBi/

https://karatekahramankitalarustasi.xyz/MTk5MTQ4ZGNkMDBi/

https://samuraikavramvesanatifelsefe.xyz/MTk5MTQ4ZGNkMDBi/

https://karateevrenselustalikbilgisi.xyz/MTk5MTQ4ZGNkMDBi/

https://karatekapsamlisanatustalari.xyz/MTk5MTQ4ZGNkMDBi/

https://dojotarihiyolundandegisime.xyz/MTk5MTQ4ZGNkMDBi/

rc4.plain

Extracted

Family

octo

C2

https://karateustalariningizemlisan.xyz/MTk5MTQ4ZGNkMDBi/

https://karateyolcususamuraidurusu.xyz/MTk5MTQ4ZGNkMDBi/

https://karatefelsefesininizleri.xyz/MTk5MTQ4ZGNkMDBi/

https://dojovekaretekahramanlari.xyz/MTk5MTQ4ZGNkMDBi/

https://karatesanatvesavasustasi.xyz/MTk5MTQ4ZGNkMDBi/

https://samuraivekarateduruslari.xyz/MTk5MTQ4ZGNkMDBi/

https://karatedoguveteoribilgileri.xyz/MTk5MTQ4ZGNkMDBi/

https://karateantrenmanvesanat.xyz/MTk5MTQ4ZGNkMDBi/

https://karetecininkusursuzvurus.xyz/MTk5MTQ4ZGNkMDBi/

https://kareteharaketveteknik.xyz/MTk5MTQ4ZGNkMDBi/

https://savassanatlarinindunyasi.xyz/MTk5MTQ4ZGNkMDBi/

https://karateustalaringizemlibilgisi.xyz/MTk5MTQ4ZGNkMDBi/

https://dojoyolundagecenanilar.xyz/MTk5MTQ4ZGNkMDBi/

https://karatetarihvesanatustalari.xyz/MTk5MTQ4ZGNkMDBi/

https://karateustalikursunumetodu.xyz/MTk5MTQ4ZGNkMDBi/

https://karatekahramankitalarustasi.xyz/MTk5MTQ4ZGNkMDBi/

https://samuraikavramvesanatifelsefe.xyz/MTk5MTQ4ZGNkMDBi/

https://karateevrenselustalikbilgisi.xyz/MTk5MTQ4ZGNkMDBi/

https://karatekapsamlisanatustalari.xyz/MTk5MTQ4ZGNkMDBi/

https://dojotarihiyolundandegisime.xyz/MTk5MTQ4ZGNkMDBi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.fee.agree
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4218

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.fee.agree/.qcom.fee.agree

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.fee.agree/app_kitten/mEB.json

    Filesize

    153KB

    MD5

    a807eb78aac496856d13614740252c32

    SHA1

    075dbaa021a212d867e14b1715033358cf7f2578

    SHA256

    1e3feb854210c2875beb3c9324496c7541e464d01e4e512525b2c7b5b7dec7e0

    SHA512

    a3d39a83cb10cf09c3f68e4ffec3ea929b77e9ac19bacb4da20af114d9d00dfb1438f9cf8ce776afeaba585dfc28741a0f2dfbb7768e8e4b9e16e292027f68d2

  • /data/data/com.fee.agree/app_kitten/mEB.json

    Filesize

    153KB

    MD5

    c4fa3d59f773a6ce504111013531a5c4

    SHA1

    1da13629e75c9f0cc4351fdf083ec5e3d986a093

    SHA256

    7c1a1b9cbfb429f190ddb62255adfb40bc1dd2e1dfdfa697bdf782afdb0dbddc

    SHA512

    66b398677c27cf93ab0bb4e832425cb4effb1570eefcdf6377c2a5ca04aa36c6067891b1fc05886b7959ac5ba5231c4882ad178d421abf1960ee2d987bea0047

  • /data/data/com.fee.agree/kl.txt

    Filesize

    45B

    MD5

    6aa9af5069a844be7122a53bd9c4121f

    SHA1

    5e2c983f817c1ae081b7f2083d38d2515b35fb10

    SHA256

    c57decd0e5ef11456c5f28dccc8d9080c592c51c06384941651dc999cd3eb94d

    SHA512

    cc6ab3da2ac8ccc76086592d6c2b7b0f3ebb14a19953509da3ceda9491c00b52744e8f2281615215e7d7a1cc98e99e6f37ffe9286cf686eee054b3cfe2829ce3

  • /data/data/com.fee.agree/kl.txt

    Filesize

    423B

    MD5

    f767ab9bbfbacfc43b3932fde768739d

    SHA1

    d8e810a0a659498a36a8fc083633c2e042b5613f

    SHA256

    421ef9370a197680f2555f602929e737719e229739292140c7ece57675fe11bf

    SHA512

    36eb01cee0a1a5819d08224327d0ca7d0ea082666786d00d1ad88e245fb5f92d88ee0f8aa2c454f123cc3c2b17a58ec4e04e9361ce9a8ac4734eb343b0afbb14

  • /data/data/com.fee.agree/kl.txt

    Filesize

    230B

    MD5

    039616255f30e98e47a72910eb34dfea

    SHA1

    a712d970b43a8b5e271b4159e00acd230d5c19ad

    SHA256

    1304e3db4ee9eee32ced50978e435927a7bcc213d9da18994a9c762ccb43e707

    SHA512

    2f2cf1e67ff09dfc61790a1f39a871878dd4c5259d553fe011dfdf77d9f08d064b2b615158d6f8b572a809d9db0a676db13f3b21e94f15a06657301be8af523a

  • /data/data/com.fee.agree/kl.txt

    Filesize

    54B

    MD5

    fb9b06a3c7b86b5db25ad9e78e399c91

    SHA1

    7917972e70e652fb16ccc42c1e4185c666440bb4

    SHA256

    2c1f2eb45264fcf3ed6971865d302b87e599501f0528cd3fe8b662c38be6cc2c

    SHA512

    44f26ac96f5aa3c961022a9c707363c809ea878e952c467a9aa4dc2df389f695f29c3426c3014a9e0a7fa237cce04e3dd4711dd7ef3caa20d420bf8795ac5636

  • /data/data/com.fee.agree/kl.txt

    Filesize

    63B

    MD5

    28530cfdf2b9715dbd8329125c30f7d9

    SHA1

    8cdd77eb54d0eb6093f25b6d02e544d00ce20fd9

    SHA256

    8214f9401f39b460fdcbf462b36895687dd1057223f11d8f2cad2398199ce829

    SHA512

    5ae263805d1acc79874aa9dbfd7a4661979bd4b9139e60e3967458a28255d1c92eac35f9971eb54d81e59afe65a746ef671caff5f390f12641a4bda32900ad79

  • /data/user/0/com.fee.agree/app_kitten/mEB.json

    Filesize

    451KB

    MD5

    a7803e7019fa0f88704b92595e8367e2

    SHA1

    69c86ae3754a589813faddbb5065094f66101e0d

    SHA256

    033ef1d416e8d614a429c3ff73e7c55913f80e2297775aab0426f63ef3c4d5af

    SHA512

    bc89012aa81618f15babe9f23330d606d816c15c4cabf52ffe7ab9620b7d1595d929322b3356a59d259d18ab3407371b62a4ef3e202e2ce830032fbd98419cb6