Analysis

  • max time kernel
    143s
  • max time network
    142s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    11-01-2025 22:03

General

  • Target

    9c98ea82d35956b44d64d33a2be4b7989b834fdb04bd2e76568d84d241bcc00c.apk

  • Size

    3.4MB

  • MD5

    56faf09ffc33470685e8a732afd578f3

  • SHA1

    a328b3241b17520c25efda1a4e18a7b699a4aa23

  • SHA256

    9c98ea82d35956b44d64d33a2be4b7989b834fdb04bd2e76568d84d241bcc00c

  • SHA512

    dfd357a5fddcb6c27d0726c9e245dd0f7833ae3c3913c466831b03ba349b44002db9dbb85ad6c7d13da5104b55de0b4dd2f02323cd7516360d483bc41ff79c57

  • SSDEEP

    98304:3TcF58XmQudfhj+Nj1eOLITlIhubb+2+SFSCT0/Pa7WVeIMBCC+Yieu4ZUCk2Bik:6QrNj1ne0HY2MBvbZdk2x

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • jp.neoscorp.android.valuewallet.sole
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4252
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/jp.neoscorp.android.valuewallet.sole/app_tribe/FPYmD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/jp.neoscorp.android.valuewallet.sole/app_tribe/oat/x86/FPYmD.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4280

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/jp.neoscorp.android.valuewallet.sole/.qjp.neoscorp.android.valuewallet.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_tribe/FPYmD.json

    Filesize

    153KB

    MD5

    4c37e1d6cede9f44882ecf943b29571c

    SHA1

    9fa77e4acb03d5141234534226a3436fecc89d47

    SHA256

    e66719fd2c1f125df1853127262748b5e2d7ce8415781af01a5cfd9ec232f80c

    SHA512

    1ec7db9eaf978730d939895059188f52a46659c68e8add9e1816d816c63776e05d17c8f991f2fb59c92b29f1cd753a5937872df31b794f85ec369b25946b2e92

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_tribe/FPYmD.json

    Filesize

    153KB

    MD5

    4eb02f1fa027f67af1dbce688d879ee3

    SHA1

    0b1a39359e3abb90c116670ec1d1ffe60a341b5c

    SHA256

    ae53570a3c5ed17ac866e4b56bf2943e5e5a9608a45f6e986c3087754e3a903a

    SHA512

    bbb2348280a05b1f8a54d7240c24ec08d32401f66d74c0b42fe7094b9bf099a0fbaa24ee8967c0d17637a036c250f86879fabdc71166a802cd97e93e50670d27

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    63B

    MD5

    ce03a78e0ac27dd02d5cc1c064e027d8

    SHA1

    9b27e6e9fa392a78485ecfaa38ba99c2f1bc1f36

    SHA256

    1c2c37233c1666a169d5c04f6dfb3b719e05434324edc3ea130a24669d381c53

    SHA512

    65645c86bf79f8e621d19a69275917ef38d2e61b76380fd477a877112490792912391b67b22139dff5946d596bde54bbe79e6d7578aaaf91919e2904076c35f5

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    423B

    MD5

    60f5cfb14a1adbcd0e3dfdfe5b4b472f

    SHA1

    eeca4e3f36524dda2528ae29c085c9a03d17a7a9

    SHA256

    ff0869326161edce5ae8db79651f8c58def3ef2c340a2b527cf4dd829864efb6

    SHA512

    905592fc02cb2d27730558b7df29ab6689558b97d4803e2fae6a206cb1107aada989e5897ce7fd4d98bac7376381cc399429ca6be155c1c74316f6ffeb27f057

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    230B

    MD5

    fd6ef633ee3ce466176f662f4a2779ba

    SHA1

    fb927703b5230f54353e517d4174184caac46435

    SHA256

    14f974737d523942ab8acaebeefefeb1479989bf31339e690ecf560b63f201fe

    SHA512

    a82c13a9ad301869af64e7d8bab3d6a0d609443aaf4db970847a3105c689980f063d1e62013d174fafd331484c33c201e99467526a22b82fe408f018639d2edc

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    54B

    MD5

    a729ac0778aa21fc0571649800d57b28

    SHA1

    aa5a9da93e083c8e470f1a682c2ae7dd8d4c5e93

    SHA256

    94d79a3eeb9353c1fbedf138649762022b9ecd8e214a96f3c9ccbd5c04e3f579

    SHA512

    d1d25f7f7f9ed412cc0855f348b1220fd542a9944735645e0f8a4ccaa6d121141cb21b262f5793f203c57606e125074ae605332ee1d44848158e08159e77324e

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    68B

    MD5

    8deb59b849c33df2471881606adb8ce1

    SHA1

    e077a08956ba69fcdc849466e24109a1d1a28f1d

    SHA256

    a714073c13bed2e2aaf9816ae5dcacb8d299f3c71c66f801ebba43b66bd7d4df

    SHA512

    4f5c12ba3152c7c881a7f8ac1f531db182b6f00de80df7ce6a2b9718dc5f0052d004c67f78d89bb1a124714b944bdc3a0d8791b54266b080e3138469508e0201

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_tribe/FPYmD.json

    Filesize

    450KB

    MD5

    be297a86a4fe11397ded2380a8b1f6b3

    SHA1

    2c498b868261034e38bd1690094a8d102bd8b8ee

    SHA256

    239eeb02d3cad87d51513982919e7f8f742595ed59914e4e4e784ef606f8ba9d

    SHA512

    014ca2401805250f2c181a36107d472cba5cf38ee9a9dc058aafa1938bc02d78ff1b577a3208e9e5bf9a5aa1a26825c1947b3b642cd2cda612a6832ba0edab5a

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_tribe/FPYmD.json

    Filesize

    450KB

    MD5

    2b1a579650b99b4bae11ba1bf6cacc74

    SHA1

    517703dcb8e0a4ddc73e7e1e32dabf9f6dc4bfa9

    SHA256

    e7d9dff9205346302f6f2dc2b328dcd711eeb013f1c32fa364b7cfe30af071e1

    SHA512

    2329400627195904240b65d1069e10bbd5b71544b4fe8e4f040021d12396853f1d7b0cb6dace00874dde5753138f6c0260b45f4bf404db1204a367765b2c123e