Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    11-01-2025 22:02

General

  • Target

    e4012bdf1c85937056e9eb293035aa227e9509479d357ff37f3ebe2679792737.apk

  • Size

    2.0MB

  • MD5

    c26a3dc1d9f319111037854abbdaef0f

  • SHA1

    8300f91c7e29f03687db0c8e076ddef43b6fd407

  • SHA256

    e4012bdf1c85937056e9eb293035aa227e9509479d357ff37f3ebe2679792737

  • SHA512

    a59d2e7384280c5b79b3eb33c7ed7158e9efc3aa49d4043fda81ced1de214f7d7efb39bc2da054bc6726b453f5eb116080b10230453d1c50305eb1c92241d809

  • SSDEEP

    49152:/dxZ6w9QJl7DEBoAo7dJ1u4zhHVNIe75oLvfTqClJighBTPogk:/dx1QJaaAo7xlzBIcGTRlJieRPoZ

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • jp.neoscorp.android.valuewallet.sole
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4319

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/jp.neoscorp.android.valuewallet.sole/.qjp.neoscorp.android.valuewallet.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_dirt/sunb.json

    Filesize

    153KB

    MD5

    9d3a6b5f35e4f6587f2446d4d84019f6

    SHA1

    f1773cf30dec99ae0ce4019580356917c303fa3f

    SHA256

    15c4a8a81ec7ed804eadb99290ddfc7451a68fbf6a59ba87ac9d9fdeb668d310

    SHA512

    9dbb39752a389684b1224d8164b57d3e3eb9c5b666e7cfc13a2ea11c14b1b78f75b182229d9a2bd3c1d25fe5c00bf3da931ef1c9eef9ffab5c94688973c4c906

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_dirt/sunb.json

    Filesize

    153KB

    MD5

    fca51e63158c5f689387784e23671f70

    SHA1

    2d0388279d4365c624e95b54da97150b31ed5da6

    SHA256

    e80b37ea923b073ceea0198bc1ec1ac8b13d97d68a96e3484ed32164404a0e6f

    SHA512

    10a27fbd1d1a1d77781ae495973be856cdba47daf53acaa8197a35fe083f8767930f77b5d7324219cae07c483ee5fc1063006a92742269524fea311b378d7196

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    45B

    MD5

    0e4dc804648bbe71d4ce435d67194782

    SHA1

    c1d652a905c1edc691244f9360cae7954b5c01f7

    SHA256

    3ccda7128629eee44513d62f931a123c767cb1ec56451f32d07679454a8e25b2

    SHA512

    fca59a40dc9df4b87e0f1fbb28a3c87279c0a99de603a9ed240dbebb00cf8fe4396a8f7297ad938ac391f22fdc4dab0decd59d7d1cb677797a1827ea60d4f5a6

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    423B

    MD5

    51a8cf0827d37945d9d88a9d7e959c8c

    SHA1

    34e8a4053b9322a6c75e0be9e713ed7ca1e6369b

    SHA256

    1d450dfe20c621a8e62e9c2f4599d33b762934c96fd4b62a31628ca9ac9d6a60

    SHA512

    d48894ef8be72a08bc5e469f0fb3ae5b22a953f7ce24ef65d551266c733d4140b4d63a94b73cdbe71c7baf79b93085803efb9ba123492b811d756bd31f829cf4

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    230B

    MD5

    aa8c3fb0b51298d743ccd0b1b91020e4

    SHA1

    77b600e322b2ad0048b480dd442ab3a00bc41829

    SHA256

    e09a8ef81294576c02c00ccb6c854937a3eb85daafb70d6e239954dbac2d4af6

    SHA512

    d20d81d4bb11cf00846214e9ca23010c629e25e6bb4f5cb8a02495cd33f21994e26b60675a33d3f72cbecfcc07f43761635ac8b3bf326d522a1f059bc91ed398

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    54B

    MD5

    4b3f576d737dfe33a0a628d248ed5a49

    SHA1

    f28d0abbf36db3a8862f06aa08366877ade577d5

    SHA256

    c70269f14a18d910c47ddeb5af287f309e669d66e6b54de6c09f4654bf6a45dd

    SHA512

    2856eb23c234c0192989c0e450b56dfc67b0230543b4ee129207e76c365d7527cf9c3c5eca5840601557305a36c0519c671d6e20804ad607ad657e1b2d24b97e

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    63B

    MD5

    92392e50fa15981126dc8dada4e63d8d

    SHA1

    34c43ac0711fbdb907efdf142b68a58c74083788

    SHA256

    b23a708c8ba60a93bdba1278e060d340f0df3094b1074037411a3ff986b1b79d

    SHA512

    fd7d7f10533be6187ac0e93a3c1bf9f391f8585f7ac39e8a30a48c67a67c3944592c05fb5535c6629eed9a571c883d4ddc0eb7f48deba72967106bbc610891c3

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_dirt/sunb.json

    Filesize

    450KB

    MD5

    2b1a579650b99b4bae11ba1bf6cacc74

    SHA1

    517703dcb8e0a4ddc73e7e1e32dabf9f6dc4bfa9

    SHA256

    e7d9dff9205346302f6f2dc2b328dcd711eeb013f1c32fa364b7cfe30af071e1

    SHA512

    2329400627195904240b65d1069e10bbd5b71544b4fe8e4f040021d12396853f1d7b0cb6dace00874dde5753138f6c0260b45f4bf404db1204a367765b2c123e