Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    11-01-2025 22:03

General

  • Target

    8f5f419da571bb2f8951b59e2d5b605845225ca97ac823bb49296d3e52f60c99.apk

  • Size

    1.4MB

  • MD5

    41be39b9a790dc511bf2b2f24ca4b0d8

  • SHA1

    c12318b7ed5dd644b5388c619a750a1b71924788

  • SHA256

    8f5f419da571bb2f8951b59e2d5b605845225ca97ac823bb49296d3e52f60c99

  • SHA512

    dcf2622ab169ae9fbec3953a211c21678fa0c462ffcbf01406defa5fc91f18f7f4f0b41ed99500401d5fac8bef2fb97ce84757f8f48c5b7f3c631d023fd5fc17

  • SSDEEP

    24576:jPjfPsMNDNn5t7VScSQ0Fv2SBWwjksyJKB8LPs0ewkCXRrCGaAzbU8gnxe90N6ed:jPjXsMNJn51VdyOS7byJKBAPs0BhCG8J

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • jp.neoscorp.android.valuewallet.sole
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4323
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/jp.neoscorp.android.valuewallet.sole/app_design/MLye.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/jp.neoscorp.android.valuewallet.sole/app_design/oat/x86/MLye.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4348

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/jp.neoscorp.android.valuewallet.sole/.qjp.neoscorp.android.valuewallet.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_design/MLye.json

    Filesize

    153KB

    MD5

    50920e5e9df5263b25eff900c9f66a8c

    SHA1

    dd6eefdc3b5f124f30bc9821b4e1b020aba0257d

    SHA256

    4daa810288a523952be331dc030febf337096689222907d6278c9dd08a9f4411

    SHA512

    f4a6302235383b17cca09fad13759ecbb8cdfb1bfbc51f03daff75cce44c4c0d280c2c1fca959fb92b6797ab2facc74c078aa851f37ae9da73bb6791f490715e

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_design/MLye.json

    Filesize

    153KB

    MD5

    5b0c65aa9c3c083e91b61be3bf6a07a5

    SHA1

    630383ac424b00b2e4fa1a399f8b3ea93a5f52ac

    SHA256

    7b90a57f8f39a4f7da5ddae64842c97e94093f135d58122cc99eb9691dd1e2e6

    SHA512

    0ad90cc4d399eadc7e6d4081ec843b4e0c8de91f28015150e22a4aa0d5b7a2a9913e61bd32caf736782be5299c20f431fca92cda445f8380c5ab535c1a8092a0

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    63B

    MD5

    5faa29639169514a2d78246dc0ae8e44

    SHA1

    2cf86ce048584cbc2e41472581addccfff19d333

    SHA256

    79966127b4dce006961ad700c759ec9170a6592e11dfd0bee0f9189e806a5cc3

    SHA512

    0c9fa2361070a63e5577a0d3bd85dd8a74963e14fe7e17b9d5b6dcd5e729ea6239be3bae24915e0493ff5a29d7179a8f5c84299f7662e26f0498c06e77d784bc

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    423B

    MD5

    6c5b4853a604231500216a96d738e2c1

    SHA1

    20df58c98185e58adb42472b7d25836b3926045d

    SHA256

    1025cc02b8be383748230678ba327549aec03e0879ebd5937c83824e2c68ac40

    SHA512

    a79befefb573909c8b9e3ac6dc844d910bf6843110059591dcc79a2fc8685a6538b8ee19e0d9b1f84e525af1936b7bbcc0f9a2d84097ba357cd84f21bb6b2d40

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    230B

    MD5

    e3bb0e064c95b99a755220bf1c76b619

    SHA1

    8025d66c3070c832a26ece943a1b16744fd29313

    SHA256

    5beeca8a64df00eae50e510e735612c0fa7cd0f82911b900915c56786e92e47c

    SHA512

    b2dd9a2057d239ef0b6de9b94c2664ad407e0687828a7faed6f742c16af9c66173a01cf373cbc706b6439c0ba0d6048be4dd04e5e5112a97e560dfa3efde8902

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    54B

    MD5

    90dc70c65b0d5b58bb3c6bdff85c868b

    SHA1

    b7dc66c587b919469e9d6988793565fd4831b8f9

    SHA256

    4359e0fa215ac199d6fb3e48f689005b3705583118499a84c28c2bc93ffd1e3b

    SHA512

    456b5ea4f75a128f32deb1f555cbf021c433d62f91e3362db4a9de21bfc185e0d0759472396ec0a06bef2381fd551ac4d05db59081ad583f5d37db76cb5d02ee

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    68B

    MD5

    d3eaed2208cf7c9206d9db563c80d61d

    SHA1

    05a6968a56ebb1ad30199225ee7cf45b509ba6be

    SHA256

    423a6eec736ebdc36d74006cac59f9989e19391677c8b3052650fa453993f2db

    SHA512

    8b0737d793ce53b3bf44f00351f2d6a8be3b30ece1799b5653e5d3a63628d9dad8f8729b5de71b2c2825dc9d4021a8b909ed75a304fd79e4506c71613f29e069

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_design/MLye.json

    Filesize

    450KB

    MD5

    be297a86a4fe11397ded2380a8b1f6b3

    SHA1

    2c498b868261034e38bd1690094a8d102bd8b8ee

    SHA256

    239eeb02d3cad87d51513982919e7f8f742595ed59914e4e4e784ef606f8ba9d

    SHA512

    014ca2401805250f2c181a36107d472cba5cf38ee9a9dc058aafa1938bc02d78ff1b577a3208e9e5bf9a5aa1a26825c1947b3b642cd2cda612a6832ba0edab5a

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_design/MLye.json

    Filesize

    450KB

    MD5

    2b1a579650b99b4bae11ba1bf6cacc74

    SHA1

    517703dcb8e0a4ddc73e7e1e32dabf9f6dc4bfa9

    SHA256

    e7d9dff9205346302f6f2dc2b328dcd711eeb013f1c32fa364b7cfe30af071e1

    SHA512

    2329400627195904240b65d1069e10bbd5b71544b4fe8e4f040021d12396853f1d7b0cb6dace00874dde5753138f6c0260b45f4bf404db1204a367765b2c123e