Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    26-12-2024 22:09

General

  • Target

    3937dc68e6b625da06c11abed258756be3be278b93d1f62cb3655f0f994c2b03.apk

  • Size

    2.7MB

  • MD5

    5ef30f517a903f6f52d6cf01c740d3a8

  • SHA1

    2482d0f8fe7cd7b72ee52be81a11488b05c07dd1

  • SHA256

    3937dc68e6b625da06c11abed258756be3be278b93d1f62cb3655f0f994c2b03

  • SHA512

    9781847420dc07c95bb50e177a34d9f75ce7d8d0f627e4ecd50f35777d4cf83a9a0cb6372787251f0a9645650f68d14288f822febe14cea1565a45f21f9a7451

  • SSDEEP

    49152:Qc36Kjcf1ObPyI4trAm8a8KLGBHzFOTkCMmn6U9BrVT9mDl8r601sS8IQO:53FjEI4iZaUzYH99yId

Malware Config

Extracted

Family

octo

C2

https://94.156.167.73:7117/gate/

https://94.156.167.73:8080/rootmd50ma/panelcgfuzwxleg9kdxnvy3rv/gate/

https://94.156.167.73:80/builderxxxzzz/gate/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.nameown12
    1⤵
    • Removes its main activity from the application launcher
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4275

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nameown12/.qcom.nameown12

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.nameown12/kl.txt

    Filesize

    230B

    MD5

    8e96e7a3c891a69601600637b3aa1929

    SHA1

    a8da8b7e6458b81b9071f2835188afe20d1e4b46

    SHA256

    424f6aa163ef5890dc1cc891b80c3b47e6aad4f46645391ec6324728b18d1778

    SHA512

    3fb0ccd9982c0f46629a9210c352b95f536d1fd20e7445f0982175c2d17a92d54348bb4f6af06b932064c505da2f565ee1d8eb67a9fca67387c422c085e94f9b

  • /data/data/com.nameown12/kl.txt

    Filesize

    54B

    MD5

    1d477c8201c3a132cd2e74e15c3a999a

    SHA1

    91276660f7f3807c77814c776548287e87eb3fb5

    SHA256

    6a8e63b1f4b70cb989d9844540649e22ed847dd7befb24c0608ed54f4e39e5ad

    SHA512

    8361be76110ab138f2ae1d2ea16eef339ed0ebea939e62c0933bbd96b58d8a5c0aaeb97b86d163d0dce9f1b5b18501f79e3c5d8d1b89c62c27e575eab26d6943

  • /data/data/com.nameown12/kl.txt

    Filesize

    68B

    MD5

    e045c2d25b3b6fe32fc213b9f30a6b17

    SHA1

    73e1df2222ec437b5507b6143fdaeb0368772478

    SHA256

    70035e1ec6cf807047b7f5cebdd88bf2420effea5368d491a461e474f724974a

    SHA512

    5d8de68bd4075f3155e637926e9b08d813050fbacc0767e268acf9637f7d3d2be00ea6b307689aae317543ac0e4b980e2afc6fbd848c963ae5e40dc48bb2947e

  • /data/data/com.nameown12/kl.txt

    Filesize

    63B

    MD5

    794469947d21ae4a4ecbf9325527345c

    SHA1

    63354f5b6527ccebd078bc40d861794efbd2da85

    SHA256

    9edd7b907dbfe91cc14dbf1276aec03840ef10d815cc0926e3c6a0275853d158

    SHA512

    ee9f599727e71a4c5eb556976abf5ebde2d25116dcbdbcee5b5c263392659acd0c038e917ac341ab058c2916a679f046234a7591217e563475f4387c014079af

  • /data/data/com.nameown12/kl.txt

    Filesize

    423B

    MD5

    967276c203de114d1223afa3ee4fdf15

    SHA1

    5ec6fc1a7a60812682f528d82ad16277c4c4f701

    SHA256

    167595c4a29a2be3a59b7888c5970534377f953eaec0f21dad474d8a30e0c6b3

    SHA512

    42b0a5e6ccbf9368985dafc9b6a21d19bf570a3ad55f0737f0d7f82839595d8adcb91c853398adb5a9d4937fee160870f509d51d1805ad50de609143e5d70352