Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    10/01/2025, 22:01

General

  • Target

    94c747e85bc3e0a90f45e5b0ab8ebc27401d18f2fe8e8fa7af10353bf21e8b27.apk

  • Size

    3.9MB

  • MD5

    f4d65d9b7be2e1700918009e73a0ca66

  • SHA1

    7e754c863be125658ab92654d4b924d101267634

  • SHA256

    94c747e85bc3e0a90f45e5b0ab8ebc27401d18f2fe8e8fa7af10353bf21e8b27

  • SHA512

    dd27b7c3c3ab30b976795374bffa158afcf39f212a712b52706ff965a63bd3cfae26ed065d0d91a82762f84e3752a48300af33490189407624775f65eecb5f96

  • SSDEEP

    98304:cxZVnGHDL7MR+Y6q6HfyB7aoPXZun4Uj0t3SdImUuqqK860lywq0MnEAqj2UC7kN:MGYXZzIdIm24

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • jp.neoscorp.android.valuewallet.sole
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4310
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/jp.neoscorp.android.valuewallet.sole/app_amount/ubkHl.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/jp.neoscorp.android.valuewallet.sole/app_amount/oat/x86/ubkHl.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4335

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/jp.neoscorp.android.valuewallet.sole/.qjp.neoscorp.android.valuewallet.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_amount/ubkHl.json

    Filesize

    153KB

    MD5

    62dddacb80a24e4743707c7e71ae9a6b

    SHA1

    f7fca552674660d71a3f2613a285f136547eedf6

    SHA256

    71e9d487c99135cf9bcbc378843ebba66c53c35d4304e477f9fc7a200262b278

    SHA512

    e8cc30c129f43ddca4b38daffaa042b5f14ffdb061193c71fd547ce51daa39c8a8ea55c301546d48ef7ed1d4229b1450dadd7a9b6b9b7d9ed685d9ed9c413f52

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_amount/ubkHl.json

    Filesize

    153KB

    MD5

    577d9e8ede9e2bda93893fdb89a92139

    SHA1

    0aca3b0fd3e60d0da32eecc51f73282da0a85236

    SHA256

    54f9b688889396d18aa0f31dfc24fffba3e55c8160e495b3f5d90892a21f56e2

    SHA512

    fb728980b3caa58742753c59f8152986e0a400087e63778af69877e0a813e8ec564d449af7899b86ab8467be8acaf618ede4cbff1fb70f7d6b2ee0c3f279d89d

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    45B

    MD5

    f395bd2ae05822e5ef3645d3c1cd4f1c

    SHA1

    a72fc31837786db800b666b45538d797eb7a587c

    SHA256

    ad017a9212e528c1eddbb5fe899f1fd6f67a535f08bb9d50509236576b1d8c99

    SHA512

    8c5023778dee9bff35de3e532644b47ebf2e9baf2dcfd30adbaaf3f76742faa6d1f79f1a92dc12ac23e55d84a8a77e470b355392b9aad318d48a34fc0b06028f

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    423B

    MD5

    8ce6b9a6484aae61519ecf1a5c86d026

    SHA1

    8a08416237be5408d4db5cf754b6dc000d924851

    SHA256

    4b280d34289014afdb283bc17b030f8c5f55f1e1fe9a49d8436b95d4c5c96eab

    SHA512

    6dc5f034d2afab847ebb37d6b00b88adbb9a950714941bd5a58717c70b4d349e3e9fe628ab03d3dc34ca2b768abc568a2edbf962b10b520c5043d956a4d01c91

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    230B

    MD5

    bd1199e907763f9ed176d56681260a18

    SHA1

    b283bd8fef64583f016d25d5e7a315f939fc782a

    SHA256

    1d20c0d5b4c054034528f2f1fa93d56bde1ac7a55994f9623ce4c1f6bd0e78c4

    SHA512

    2d263618494da7109ebf74dfd3ce1c252cca2776d13116badb689bdc1a2ed51c3edcd6d548702a6938cf7320aece2cd9239d80e9650d1b504da9cca18b74c4d4

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    54B

    MD5

    569608110e5fc14b003f4c4ab8d4a4cf

    SHA1

    3208a6fe3f4cef7ce1112d6d63ad4e1d060d82ea

    SHA256

    210ccbc74fb94aef478b3185481735ee316ac562432945f0e0fc99ece3be1cf3

    SHA512

    f600589f121a4333dd9062f6bc30f78960ea25f867401131a8607a40fcd9bcf61c83b7a8ca721e596858063b56e9ff46b3ed82ae6bb354e7dcd6ba6dd6c94c36

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    63B

    MD5

    9c286d8fc5e44277168a001b0b010f3c

    SHA1

    892bc662a87bc3bada80a4079fea169e5b8ce72c

    SHA256

    7743364e75c0026ad80f8cdafb9e4183ce01490f2d51bc449a56822e52698fdd

    SHA512

    d8c361b1d524c8fac7cbe81dac1e1cd4ab409e40533cb8ff40c92d7f5aa4004a766afac726a9520c3c8e61c7f5f97fcd421813f3f8ded86a565af323a99104e5

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_amount/ubkHl.json

    Filesize

    450KB

    MD5

    be297a86a4fe11397ded2380a8b1f6b3

    SHA1

    2c498b868261034e38bd1690094a8d102bd8b8ee

    SHA256

    239eeb02d3cad87d51513982919e7f8f742595ed59914e4e4e784ef606f8ba9d

    SHA512

    014ca2401805250f2c181a36107d472cba5cf38ee9a9dc058aafa1938bc02d78ff1b577a3208e9e5bf9a5aa1a26825c1947b3b642cd2cda612a6832ba0edab5a

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_amount/ubkHl.json

    Filesize

    450KB

    MD5

    2b1a579650b99b4bae11ba1bf6cacc74

    SHA1

    517703dcb8e0a4ddc73e7e1e32dabf9f6dc4bfa9

    SHA256

    e7d9dff9205346302f6f2dc2b328dcd711eeb013f1c32fa364b7cfe30af071e1

    SHA512

    2329400627195904240b65d1069e10bbd5b71544b4fe8e4f040021d12396853f1d7b0cb6dace00874dde5753138f6c0260b45f4bf404db1204a367765b2c123e