Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    13-01-2025 22:01

General

  • Target

    a06cbcf9a3b7047e3e833727a815294323b71c07582ce99b023a85d0157e3469.apk

  • Size

    2.0MB

  • MD5

    a143e60230e024c01acc2515bc6b1e5f

  • SHA1

    f01f10bcfd6fd06a971c9a6ee85bcc26a4152a68

  • SHA256

    a06cbcf9a3b7047e3e833727a815294323b71c07582ce99b023a85d0157e3469

  • SHA512

    0c188fd88cc75e8e6b03ef9d865a5806dcdc5a29ce1f0e523e790638ca0f4269dc43ef298252cb52d3982bc905611cff09401107b7aed1f34ce1bbeab7302b5b

  • SSDEEP

    49152:qqG1znaep/aXgCF8H2GoJrPTIw6f+2wd4RgWnbWjpPv2psqlN1PrgGZKsL6:qqcueTVWGCOG9qDqpn2aqlnUGZNm

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • jp.neoscorp.android.valuewallet.sole
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4217

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/jp.neoscorp.android.valuewallet.sole/.qjp.neoscorp.android.valuewallet.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_benefit/RXOx.json

    Filesize

    153KB

    MD5

    8ccfe21c44947b3096b865f8cfe50780

    SHA1

    acbea0e489d5085b638b806eb84b6e3a0cc610fd

    SHA256

    bbfee939e64ff7d4dd016cdcb2d1b15b62bf2122288e655ea9a4b71f603608d0

    SHA512

    59de1f85327e2bdbe8dbb2f9a6c628355db25faccb605d943d1e1ab25466599c3343c80e52610deed660ec692912559deb3428c75989e0d05d0478c6e31967cd

  • /data/data/jp.neoscorp.android.valuewallet.sole/app_benefit/RXOx.json

    Filesize

    153KB

    MD5

    dbd5143ca0ec7558fa87765b590d8651

    SHA1

    514ff324bf2bd6a94900f5daf8dc28e3377294a9

    SHA256

    eb716162b14cf9846e2059f663cf0ddc2c8d6e22ab5d797f6bc4f09799e45ce0

    SHA512

    1adb46637b9a0bef2ed10050940a1f4d0de04d8608139ff65f9a2a782f9315dba7ae7b5ec58482836a5b23a5929a14b6fc3cc44d48c988fb9b4ad4978d5301ec

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    45B

    MD5

    90539c502e40cd151a0f04cf105253b2

    SHA1

    b006a00d236db493e784a879049a27f23f422c4d

    SHA256

    5516336b25f0f74798d01c7218b1780f50924bd2646af8377b5250722a7af79f

    SHA512

    7543034d945eb4714b8f56c9d6a31a6347ffaf4eee105b4876ab541998d0713266b5e815f48accf902c62597d25fb53ec21f7e7f9dc892baf252128520f6767e

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    423B

    MD5

    13bfbbe83314e6be6c7f13d6664d58bd

    SHA1

    7b235dd6a12f662a2edea23a033657d7d657991c

    SHA256

    b901e8da8255ac0b8e4006430ab66bd64300fb6cc231e89843ade57c7a5e3e49

    SHA512

    69a3b7ed27a76baf0e9bb5e13583da79909e886e433a604cb7af68822ed838367abac52fd88f24a5d449ada0d16b0871065f9da317d719979dfc015f91de24fb

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    230B

    MD5

    7d3dda289eaec62a900c53c997d8639e

    SHA1

    e838be06466bfa36cd367e83ed0d027b514fcdea

    SHA256

    2a01a8f81a8356cf0aead8092fdc9d8fc33473b73bae8dabe4f59537bf9dc2e2

    SHA512

    1afede8f4ab1e08a021bac711ff25627ccdcf53c9870607e9e01925b08dc1060180cc0cdad44e75f6865580331c399d29f92974a66063f16f9f46a0b83e9b314

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    54B

    MD5

    1673ca3bb190d64ac66c328eea82b16a

    SHA1

    a7f766bdfe6bbc5366ef2579588865e467635d67

    SHA256

    b37d183ce80f5898cfae1f5a4a96af56b428104b763ccdd74863939329f61559

    SHA512

    f2ac718a1baf428a0c16668cf13ca7c30097affc61c6a01cd15a7168c73fa56ce471bb59349db2b39c9a38f7622d8ae621f2ba68cb05b725d0464f550a301976

  • /data/data/jp.neoscorp.android.valuewallet.sole/kl.txt

    Filesize

    63B

    MD5

    60372b9bbeae6d45b13aae24f9beae72

    SHA1

    79d8ff583dea421d10ebd82986c476d560c5af17

    SHA256

    4f2a9b2f56e3deb266cccf6c3de0fd16e7a6122123bc39f228ac2735365a3be0

    SHA512

    dd0865b258584dad2c8e554d26c413f93daa3dcde22e88070a72fc6538ca0a5d00b90d36d3c7fce4cda89603b32cd620c580fdaba3261bf9e7911ad633568d18

  • /data/user/0/jp.neoscorp.android.valuewallet.sole/app_benefit/RXOx.json

    Filesize

    450KB

    MD5

    65bb8115258b7d4900089a72148e6693

    SHA1

    d273f7a7fd0ebb1b60cd4f5ffa35235542e93292

    SHA256

    f5c734648edd05990fece37efe756bc5ac7c3f2d9bbddb3073d2c037b2b20067

    SHA512

    59ff998184927919e5db6eb7be59011035469954b945b9ea526f9175346d29d66d335b088935e856e9981a4c9a97bda4d8c1eba4e2461fcd4cd33bf380145826