Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    27-12-2024 22:00

General

  • Target

    f3209c893dc677da9b77c19c530db406e99508920c32c4e806868425fe2b6a69.apk

  • Size

    2.0MB

  • MD5

    31ef9fcf9d1e1670a77be75ebde96479

  • SHA1

    66080be3e3100a7d45b74a3963a7f10909f0445a

  • SHA256

    f3209c893dc677da9b77c19c530db406e99508920c32c4e806868425fe2b6a69

  • SHA512

    ba022e990dba40a9385ac90d10771f33f936034871262f57828bb99b1771295d2d7d84e8ab5b42c1cc30671538c1a3fe07ab8cd11c399bf75a87ebc3b14f6e7e

  • SSDEEP

    49152:1r/qJXJqkq7yI/NF4VMT1b/KeUfuETQYAN6GhExfu9SB49O4wUccR7:uZqV8VMTgecT7rGhExmoyO4wUTR7

Malware Config

Extracted

Family

octo

C2

https://sariyisevenlerinhikayesi.xyz/YzNlNTRkYjIzODRi/

https://sevgininsaridoslari.xyz/YzNlNTRkYjIzODRi/

https://sariyinkalbeetkisi.xyz/YzNlNTRkYjIzODRi/

https://mutluluksarirenklerde.xyz/YzNlNTRkYjIzODRi/

https://sarihayatveduygular.xyz/YzNlNTRkYjIzODRi/

https://sarininetkileyicigucu.xyz/YzNlNTRkYjIzODRi/

https://saridostluksarkilari.xyz/YzNlNTRkYjIzODRi/

https://hayatisaridenizinde.xyz/YzNlNTRkYjIzODRi/

https://saritutkunuinsanlar.xyz/YzNlNTRkYjIzODRi/

https://sarisevgininkuvveti.xyz/YzNlNTRkYjIzODRi/

https://saridunyaanlamlari.xyz/YzNlNTRkYjIzODRi/

https://sarisevgiileyenilik.xyz/YzNlNTRkYjIzODRi/

https://renklisarihikayeler.xyz/YzNlNTRkYjIzODRi/

https://sarigunlerinkesfi.xyz/YzNlNTRkYjIzODRi/

https://sarisessizlikvebaris.xyz/YzNlNTRkYjIzODRi/

https://hayatsarisemalari.xyz/YzNlNTRkYjIzODRi/

https://saridostluksohbetleri.xyz/YzNlNTRkYjIzODRi/

https://sarisevincindunyasi.xyz/YzNlNTRkYjIzODRi/

https://sarisanatvenotalar.xyz/YzNlNTRkYjIzODRi/

https://sariruyalarnincizimi.xyz/YzNlNTRkYjIzODRi/

rc4.plain

Extracted

Family

octo

C2

https://sariyisevenlerinhikayesi.xyz/YzNlNTRkYjIzODRi/

https://sevgininsaridoslari.xyz/YzNlNTRkYjIzODRi/

https://sariyinkalbeetkisi.xyz/YzNlNTRkYjIzODRi/

https://mutluluksarirenklerde.xyz/YzNlNTRkYjIzODRi/

https://sarihayatveduygular.xyz/YzNlNTRkYjIzODRi/

https://sarininetkileyicigucu.xyz/YzNlNTRkYjIzODRi/

https://saridostluksarkilari.xyz/YzNlNTRkYjIzODRi/

https://hayatisaridenizinde.xyz/YzNlNTRkYjIzODRi/

https://saritutkunuinsanlar.xyz/YzNlNTRkYjIzODRi/

https://sarisevgininkuvveti.xyz/YzNlNTRkYjIzODRi/

https://saridunyaanlamlari.xyz/YzNlNTRkYjIzODRi/

https://sarisevgiileyenilik.xyz/YzNlNTRkYjIzODRi/

https://renklisarihikayeler.xyz/YzNlNTRkYjIzODRi/

https://sarigunlerinkesfi.xyz/YzNlNTRkYjIzODRi/

https://sarisessizlikvebaris.xyz/YzNlNTRkYjIzODRi/

https://hayatsarisemalari.xyz/YzNlNTRkYjIzODRi/

https://saridostluksohbetleri.xyz/YzNlNTRkYjIzODRi/

https://sarisevincindunyasi.xyz/YzNlNTRkYjIzODRi/

https://sarisanatvenotalar.xyz/YzNlNTRkYjIzODRi/

https://sariruyalarnincizimi.xyz/YzNlNTRkYjIzODRi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.monster.artefact
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4254
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.monster.artefact/app_scan/sd.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.monster.artefact/app_scan/oat/x86/sd.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4281

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.monster.artefact/.qcom.monster.artefact

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.monster.artefact/app_scan/sd.json

    Filesize

    153KB

    MD5

    b89a48903feb9a8316b780309b43f532

    SHA1

    5aaf98d8a4882e22ce8fc36fcbfa72e8ef5319a3

    SHA256

    6375b389e2c2a101cd29a68b0a293df0d7c4fcae90944b5d95b4604dbb02f564

    SHA512

    aa1255cc72c0d9a6243a633798bdb16a1261afbc7bff37648f6d194a0dbb6409f742f09a84fcb81cf0ec68489c4a983d39138e729f0491ee2994b1c7a7dc4cb4

  • /data/data/com.monster.artefact/app_scan/sd.json

    Filesize

    153KB

    MD5

    8fbb67f3083894c15cb7b983a59b9774

    SHA1

    b8b7398412c57472b6add867356bada445cb01da

    SHA256

    35d3e7692e8e2cba4d0ef4a58ea5be1e1ce7c846300379e1b40cf52e1ab0f4af

    SHA512

    d384b08b2b23c2646a284e0d5879089694fe3a36552641931cd2da8e2d5c4189a975927f2d5aef16c685fae8e59ebe0d7fc1559d59179b01a5fff7e270a947f0

  • /data/data/com.monster.artefact/kl.txt

    Filesize

    63B

    MD5

    a88ba628df9cd5da53c246d0c838c95a

    SHA1

    00dbb303baa73c3ca3bf1ddf9666261e709834d2

    SHA256

    cfa4f08d72694bcc35daf0f123f3150ace2a5830ea02e8554261db726dc575ed

    SHA512

    abec51b294112c9a68b70c7e08aed32bb0c56dd82ff1dd0299e48e7e1021164ef976d23a0da7432b9eeaebb88b57d73d86d4c5df2ef3c37458af2ce0bf0b913c

  • /data/data/com.monster.artefact/kl.txt

    Filesize

    423B

    MD5

    7f6c661af06167517d608b2310530654

    SHA1

    baf0426cfbc89f259c577d9e7e86a70c70ab23cf

    SHA256

    a233469ba4eb9732d3de26e8c58d4f24b1b6503cfcf629e97342fc3fcb2f504a

    SHA512

    9236f3deae855bbec168ea24e6b30fd16b49b8d476101c827ab1f3f2f701e60acc2938aa82a88771576840cfce2a36caaceab3e97be7ffa6d6316f20e4fa4767

  • /data/data/com.monster.artefact/kl.txt

    Filesize

    230B

    MD5

    a37b502518148bed503a044fea5351ad

    SHA1

    1dfa70185cf551f5d6022cd5e97ce8c1457c6e73

    SHA256

    d958ecdc9c008364b1a92523182e840de5ed63e095c05c91b028a8fa1e39a04c

    SHA512

    ff9d426a5006259e60783443e670c689d915ab2e31c8f7eeab2fe18dacb647466f74dfb3eb91c3d634382e061a076d09b164583c30749a1ab37bfe191d8067d5

  • /data/data/com.monster.artefact/kl.txt

    Filesize

    54B

    MD5

    fa16474a026e5c0ac5817f7a2e80b36b

    SHA1

    79e88a5158d5ae5ac051369bfe0055b64ddf8a24

    SHA256

    441635683709f7422c1db287fcc3d66e3e833a9b8667af803a16656eb3674d02

    SHA512

    a41a418d44b202cc8d7ce2bd964f9cd2d61a1b22f0c9da332e018cba71f14dcfee4aafb941d3e856116977ea7d39b222c11c645b9485c8b98c4418d7ed686ad2

  • /data/data/com.monster.artefact/kl.txt

    Filesize

    68B

    MD5

    1c70320f391974db2bea17a61861ffe1

    SHA1

    ccade14f5bda317e91fd9256833f7225912f6764

    SHA256

    759ee7685f5b5a4df56190f27a968a883c29502c6af7204a8a74116f52729861

    SHA512

    54799444f3bef706f596582b5a51c335dfcc2248ae364d1087959581cb3c0892e092aa9e11cfb14b86e5b3aac916be403b26f0a1d7632f1c07ac8be76dce504d

  • /data/user/0/com.monster.artefact/app_scan/sd.json

    Filesize

    450KB

    MD5

    273fc9126117ac8f49388e267c8ac1e1

    SHA1

    36140a0f5e49569aac0bb409efdc9f420d52f65c

    SHA256

    d7f8a4770507c5e4da3f10d1911e350036bf8accf21913de5eed49a64fc99d96

    SHA512

    f81fa5617fb32f7f5783e770ab0b73ab7bbf91ac172c6c86fd5175b39f2f1fda93032ba2a00526ec3364dffe2ff0081a576eb7563de1323fedbecaa6a655b2eb

  • /data/user/0/com.monster.artefact/app_scan/sd.json

    Filesize

    450KB

    MD5

    3aabf2e7cbe71218197e477855424f7d

    SHA1

    8b9a0d20a4ff42ca388c9f72b0f7658e6fa4e5da

    SHA256

    fac0b4e992160a2ff8dd234402de6278af33928f177382fa51a03d4144bc264a

    SHA512

    e499105eab9edb8944c1e737739d35c0ee4bbc2d2f3cd5dcc337f36a22124d7639e4464354a5c4fe16bdd9d6d4cd1e10dd995f552123d41f2ae33391ba8072c7