Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    11-01-2025 22:04

General

  • Target

    56786dd0bbe3374c2d3f1a0113d4250c469fa2688766c3d80419eb7b98863d02.apk

  • Size

    2.7MB

  • MD5

    4893f50d22e75f424eadb68bc4047001

  • SHA1

    c7c425a90e590fc259880e610eb5d920acf24919

  • SHA256

    56786dd0bbe3374c2d3f1a0113d4250c469fa2688766c3d80419eb7b98863d02

  • SHA512

    c2f6baa825ec6776a766114eca13befa16797bf57ccb0b696addfbb94a4f367899811013501d9ead19804c47e7f35fb713201262717708c4f5eecb763c240f42

  • SSDEEP

    49152:OChygC06Kjcf1ObPyI4trAm8a8KLGBHzFOTkCMmn6U9BrVT9mDl8r601sS8IQx:vhyb0FjEI4iZaUzYH99yIm

Malware Config

Extracted

Family

octo

C2

https://85.31.47.102:7117/gate/

https://85.31.47.102:8080/rootmd50ma/panelcgfuzwxleg9kdxnvy3rv/gate/

https://85.31.47.102:80/builderxxxzzz/gate/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.nameown12
    1⤵
    • Removes its main activity from the application launcher
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4247

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nameown12/.qcom.nameown12

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.nameown12/kl.txt

    Filesize

    230B

    MD5

    7d0097140b56b27b56608ba2bd82a99e

    SHA1

    8ee1cbcd65f57686c67385c88c861e7c5416ce4f

    SHA256

    15509795d38b9913b98470768e6877319288e0a9eaeb30002bf4e2bbe588ac1f

    SHA512

    bb3458ebf5afd98682448c423b508294e1e19beaf9fbe3a274658cd92a4689797de1229df289bc38685d4e6aeb8e1ba3a2afc0110c7b23c63f0a7ed1215c3c36

  • /data/data/com.nameown12/kl.txt

    Filesize

    54B

    MD5

    b291862ba1c5c82bf3226dfa9528f1ec

    SHA1

    99d780a347b4604f2ba7f7f2df0b2c655594630d

    SHA256

    a131c4ce3eb8e82c5bebf1dde05e661418c5c7b17bccb226f950c8ced2206d8f

    SHA512

    fb55161982015255ac1635369e36f161faa21933418a0250c9b519e8c821bd5a9a445641a4ee3506ee2fed09dc0ef15d37c44822a9fba72701ed0946cf8e5e28

  • /data/data/com.nameown12/kl.txt

    Filesize

    68B

    MD5

    12b86a19066bd20556d71a064db8f397

    SHA1

    33fd1d88bbe4460713ea2311779f6f1eaa7cfd15

    SHA256

    7e018ef00f1400f8a441d60796dccd22c5097444ab951e0d1a56e4c86aa6b60f

    SHA512

    a13c08c8c7579d1e5ee2c7bcae89d3e5c0cf26ca059e037cf5cdae18179074af5afe3ed90e03833b45a8da4d61adc406f5de25be20a4e4d029cdc02d32191ba1

  • /data/data/com.nameown12/kl.txt

    Filesize

    63B

    MD5

    80f2ce1e70cf76cbb4c1dcb798af310b

    SHA1

    da067e837a290feaffa466f3c313c484c98a70e1

    SHA256

    ef5c1493ab690a89a4525fe385070bd20c79fe23ecf3506df19625af2f0a9d4a

    SHA512

    098fab1dcc7f5272d4bf270cd4c717f37ddf39baf52e48f3e2240477a30c2dcb84ff30d5e974ffc83b7dc7f8cb16267621a869aacda7c4f23964d495e7186f4e

  • /data/data/com.nameown12/kl.txt

    Filesize

    423B

    MD5

    ee61aaa030a7675ea3012141c48a7e25

    SHA1

    d8a3466b8f19a08f38413dbedad7c51850198de6

    SHA256

    20b0b4411ddfcea0672ce21d7a1bfa6c6966b1859cc923708802f8e8c5d4ebe2

    SHA512

    fd1976b2977badd8b399816cfae6a82d05f172fac11d48887660edd676d8c4071b2e84a493a71df5a010b8b1c33d6b391eaf942f6f4719506969b3e3eed43285