Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    13-01-2025 22:01

General

  • Target

    901991aa251a85a27dbb1fd8aec9b911c8391f5bea6d1e3cf4990d7dac842c9f.apk

  • Size

    2.1MB

  • MD5

    bc305b7183d1439d1d89292fb7d92392

  • SHA1

    bcfaeb7f7e75bc19961b691cb8e2bfac0a40f038

  • SHA256

    901991aa251a85a27dbb1fd8aec9b911c8391f5bea6d1e3cf4990d7dac842c9f

  • SHA512

    9beaef621f78a57c4a9725700d408a65722f35879f6ffa11866e6ff7d4634f0b7c99193f4416104233e92f094f9fb8b371ebc34e007a5e4da8dca3677817c449

  • SSDEEP

    49152:6/adhxM+fDWDpOjjSpGY7zQYPgOB8wriH6MJev4gpvN6TvVwELuTb:yKH7bWgjmICkY8w06tv4aNquv

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • jp.neoscorp.anxdroid.valuewallet.sole
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4513

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/.qjp.neoscorp.anxdroid.valuewallet.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/app_rigid/Scth.json

    Filesize

    153KB

    MD5

    96c46190d0800e035d9b5c218c8e26ae

    SHA1

    69b1cfadda509d28e849f43366596863bcc2956e

    SHA256

    4208e134dc42e4a39460721bcf89feda2f5224b4a85127b209d3756cceb26be4

    SHA512

    37bbbf90a1c2e223989a5b6029a1f76f117c23ce41a9c3ff7b505a438aa84bf163aef5b04f0f74058492ed4339986b51ba11681d4becb64e36af3806114b4a75

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/app_rigid/Scth.json

    Filesize

    153KB

    MD5

    c4bb3409b4459fc663a3b7f5ac31ce80

    SHA1

    af8188ce4ebe2ea8af47927e70eddd8b78ffa7b9

    SHA256

    8b7406528121146128f8ca165e0c9a508c6ef6963a3d3fcc33bc62588938d6c0

    SHA512

    ad727ff5f1b7b3ab8ddb8494022c4df6c68bf8a84fc65dc7c4d40464ad2a448f6e0fb8533c0e7f688dadebfb8d4a1b3ad79fe068b13becb92e93af3765b8e6ec

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/app_rigid/Scth.json

    Filesize

    450KB

    MD5

    65bb8115258b7d4900089a72148e6693

    SHA1

    d273f7a7fd0ebb1b60cd4f5ffa35235542e93292

    SHA256

    f5c734648edd05990fece37efe756bc5ac7c3f2d9bbddb3073d2c037b2b20067

    SHA512

    59ff998184927919e5db6eb7be59011035469954b945b9ea526f9175346d29d66d335b088935e856e9981a4c9a97bda4d8c1eba4e2461fcd4cd33bf380145826

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    52B

    MD5

    4749aacb850e08b8995265695c4b76c1

    SHA1

    b5270b69d6297deff164a61456469d63aa27df25

    SHA256

    2bfb15d51911b95c73fccf2f6473471655f825a47f7b5e9ed4f4d1962e0e9528

    SHA512

    20636057bbdd2a2794291fd02e9616837da6178fd9161e3ce2bc65dac95a15a68f1953eb824c85f086f182d0600cacfc1d78a8634f42ecca2df1a22162fb231e

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    66B

    MD5

    b19058fe60c02471e9d76b8e03392d86

    SHA1

    b82ad3e403ec87ce4e1ff11a03ad3b21b8162728

    SHA256

    36c114889f21b90e5647ba105dbc0df10e67d904733641b1c745b844c0cb2bbb

    SHA512

    c01843e3f168a4405b7b170286e9f3746f962f5039df7df0fae2ea1027c56c015ee0bed5d17e7e571e667971af402f07f4a8d76eddd0d7ce5ec75a4fa7e32648

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    84B

    MD5

    9163a0cc9b48ec2a80e9d8ecdc7fc57e

    SHA1

    c4646c2b75bf15ec33290d4852a243f593785067

    SHA256

    dd30e9658a56d6ff5190e7c55b491271123bb25e79212c44be93470e1f59938b

    SHA512

    0d30820254507d8875c5c931b90f9172c7df059f58d9f84819030669bdc23b8912dd752f6c0a728937528f9d2314e85195e60d357dc66b77a42082895fc1ee0e

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    68B

    MD5

    06ccb5e60324eff107917b8249904de0

    SHA1

    b70d757b60062cd80b56e0b402c09823539e529f

    SHA256

    859c5ef14455d25bda21a56ede371a770b1e21a0980e1e8004ec2387111f6929

    SHA512

    4aea5e8d85ecee413624962269897865bb513f9645782d47cfd2018c4e58ff7aba74778b38c958e338834965b80a8f27ecf9169f6a1cde8ce16da58b37fb209c

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    214B

    MD5

    dfc80c83e53be7f21edeb6b997108dc6

    SHA1

    cf7e32c1edbec091abb344e99cfb128cdf18877f

    SHA256

    433c476876e63182ad362f4644ac482842c451d9a39f79eccf1bd0c5e357c78f

    SHA512

    ec8294f2cdb1911619825c46bd7ab99dfab89e98d6f98e61fac0965ecf7437bdc898c12106bb05376276622d737dc7264f4ec1e3d3e27e0830a48a10e33fb73d

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    54B

    MD5

    5b5a8bea45d1cf84a26f006eef69c0cf

    SHA1

    1bf827a9e0ef66921be98f598d51a2b9fc3f81e4

    SHA256

    9c1c0353f24e319dae5c7372a0ae24c55d34108f31e0f0cfc81a6096e22efb25

    SHA512

    97ea33de9b8a29dadd18fca9406eb64bc75eea6f29bb5984523662a7753851f459c51f86467ac941adac03e78f1143dc9495c61ec3389da628ed1cf73b5d9c84

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    68B

    MD5

    df579c9ed1e6707ace993e2e912d5fe7

    SHA1

    a02b26eec13bc0a5d6a8cae5f9e55d2329b8978a

    SHA256

    93e1bac9f6ca5a1cd2b871d8956aac7b3d353a8c15ce55b3d95a7ed3cf40f919

    SHA512

    ef77b4d8c22b8524f35c09a8e4c4f44c0558b1959c06a38bfa7feef2fbb18cf71ae9554c31c969b6f7c0b0be4ccbe1f66200c67d7ee615ccaa94177bf0a61391

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    60B

    MD5

    a9a886606193ded42b84aad8e9f5fee0

    SHA1

    582ee297f13681f47883d2babe57a2409bf62fe6

    SHA256

    e946a0634b631affe44b14f03dae34bfbff73a2f95d2c87758a3d703c4ade651

    SHA512

    f6898ac6eb85606bfbd3cf08fb58b757dd15526c7f6ee54976eb930bf5058e001585c5fe7cbc0d7555e28dcf22ccbc398efc9f941390e055dc89e0a3831351f3

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    490B

    MD5

    3f8957f5afbd9dbe07ac914cf7a5004d

    SHA1

    3531f1e14f8f053154e23fcc96dc780b5e401da3

    SHA256

    fda046ef0872c98b44e7b42163e021f36dc4f59f0337b44988e5ed1b0e0e5a4f

    SHA512

    a42806bce75c2076b6a6c3e244ff2f68a30b39adb2b9a7199189d6c1c1f70fccad4987529400b7784177208653aa6e05874ae7aa347c3870a401d060ee466199

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    60B

    MD5

    5f0b022c59abc63002441b5e3db441d7

    SHA1

    4c073d85995086d7b73b9038db5529a8faf6619a

    SHA256

    a5621d2dd8abf0cfb53ad6ef0d4a17bbabaa68c03006657bcadf4f26aba38696

    SHA512

    8473bac69527d9aa05e89dcbd2e6e696ba67b4c70f1c0cc3f1fc4261db562056b5dcf81e757597ca055d751fba69cfe60fb509826c41d5cef181cab00b24f13c