Analysis

  • max time kernel
    142s
  • max time network
    133s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    11-01-2025 22:02

General

  • Target

    b467ab7ccf050aeaa6e00e27d016eeb1ddfb72845914e3862cf5d6e28d26f20e.apk

  • Size

    1.7MB

  • MD5

    00d230fe61db12a2f49a6069e2132868

  • SHA1

    b9fcd34096143e8ad7228040a4a72ab8ee4ff5e7

  • SHA256

    b467ab7ccf050aeaa6e00e27d016eeb1ddfb72845914e3862cf5d6e28d26f20e

  • SHA512

    9727db8f048f04d54b5e7d22ae90c58674f59fa68b421b6b9cc46f631ada969423aef775bb27f1178a9cab8cb9e229a935a5a9f79500c59ddf21be8e4cc7d5d5

  • SSDEEP

    49152:z9UosnS9RMT8pqeYlYF/LQvdGyr76Jmg7ZHBAN6oWINJO5tDixjTZsqyFbVe5X:z9bsnS9q2qkFC3umY6EolO5t2jGqyhA5

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • jp.neoscorp.android.valuewallet.sole
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4262
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/jp.neoscorp.android.valuewallet.sole/app_cheese/DItte.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/jp.neoscorp.android.valuewallet.sole/app_cheese/oat/x86/DItte.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4287

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/jp.neoscorp.android.valuewallet.sole/.qjp.neoscorp.android.valuewallet.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_cheese/DItte.json

    Filesize

    153KB

    MD5

    86bca1180209c2fa978ecba079fac203

    SHA1

    4b67d0679bf28a445a1315376d836f7a2accd202

    SHA256

    2d7dd22528c97edea85ed1e57c542de3c518e014769b0f6a66707447d14a97d9

    SHA512

    02f6dcfdbcd607ef60dafc39c3c431eaeead72ef90ba8f8bfd927da35532897558ed696b33660da7436ff672446beff032559aa5389326285702eda430663364

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_cheese/DItte.json

    Filesize

    153KB

    MD5

    c36ed253b5ac733a98abb8129a9adede

    SHA1

    642f2e42e233e84d3a983ffe69f9602750871d50

    SHA256

    c61e158da433a63fbff77f7d2c5eaa0c122c1b8f866254857ca99e1a0f5d5e16

    SHA512

    053d05eb2d62594849e234cbc0bb2d19feb5c079f578b692cbc4991048a45073a6cc9fa11bd4b1005324ec6cd2bcec6c2a683a9aac72670d70f6eaa46849c275

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    63B

    MD5

    82b2909cc4a881397c418e6ef1206cfc

    SHA1

    3aa8b5844fe3120df9540770a98f5c12044efe4a

    SHA256

    7a30e3a35eb8946b8665631c3116f430b63cbe1ebb3e8eecb9e100c176d3648c

    SHA512

    5c0c0a6c8c8bb7bd7a32c656c479f6073b6eec40926b7d38cbcd4c938f8ef860157065ef6210f199c83758a43b7eb6f96448d9e106dbb7c4a152ea563c253193

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    423B

    MD5

    43142ec7cc3eb86978859da7f73e4ec7

    SHA1

    9ef4371b004c5ae28af4c5e5194a1c731c1c95e6

    SHA256

    d932c1550ba7ac779333f66d81c7aed02cb7a0e72b87694b6e3fdd8818d99d23

    SHA512

    6799765ce7b08f292bdf9d039a3c601a5201a5790be8eb28b58154313f311bcd9e0547290c1377f8374b35ae721357cae63a352bdcac8cf2a1e129b63e8ac881

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    230B

    MD5

    09fc2780c3ed73f7cb5caa2464c0e45a

    SHA1

    f139ff12b7cd04e8880d1213a8615134ea742ba7

    SHA256

    c119616b6ae8e2a201a6ce0e0cf9917459fa9e7fb8df9bf19cdad567a2f77672

    SHA512

    8f0006fd3748a9e4170b4eedb1e27b4dc7cd26ac0130136996911ede16715c7c91f3ebd3a0165504ca17aa3fe62851f8b7fa8cba96345317a96b831ae12770fa

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    54B

    MD5

    5aa23ade39b69269938f6a16c0d4bb2f

    SHA1

    c2a434d270e46b08c9c7a4c8f33cabe882217cea

    SHA256

    e9e2ce398ca9891e8fb87ab00637325373b1bda573c49b7659e10e2781f29865

    SHA512

    40275701d1b808e74a458cbd0bbfb6e2f678b359abac28ff10e889b0e4a6b4161245b15bde5ded979beef72ae66bee54d8dcc14d2dce3f8d56c5b5644552059c

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    68B

    MD5

    1ae7b7041b7a187b4f70f11ccbef099e

    SHA1

    574989708680d489d98252499c8bcfc5aefe74ae

    SHA256

    7704b0cae373bc8ea69f6b514addc7d4f2a03cf432374a35607bbfc8e614acb7

    SHA512

    936c1f09efce5af2b15643a39bdc94bec26279fb7bb77d251353f426f00fccaffa491f16b22d7264aaf8702c13a375154160faaaec70bfb5e0f6350ea776c337

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_cheese/DItte.json

    Filesize

    450KB

    MD5

    be297a86a4fe11397ded2380a8b1f6b3

    SHA1

    2c498b868261034e38bd1690094a8d102bd8b8ee

    SHA256

    239eeb02d3cad87d51513982919e7f8f742595ed59914e4e4e784ef606f8ba9d

    SHA512

    014ca2401805250f2c181a36107d472cba5cf38ee9a9dc058aafa1938bc02d78ff1b577a3208e9e5bf9a5aa1a26825c1947b3b642cd2cda612a6832ba0edab5a

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_cheese/DItte.json

    Filesize

    450KB

    MD5

    2b1a579650b99b4bae11ba1bf6cacc74

    SHA1

    517703dcb8e0a4ddc73e7e1e32dabf9f6dc4bfa9

    SHA256

    e7d9dff9205346302f6f2dc2b328dcd711eeb013f1c32fa364b7cfe30af071e1

    SHA512

    2329400627195904240b65d1069e10bbd5b71544b4fe8e4f040021d12396853f1d7b0cb6dace00874dde5753138f6c0260b45f4bf404db1204a367765b2c123e