Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    13-01-2025 22:01

General

  • Target

    32d8eff036f4d289311171182bdf956ab3eb4bb1f9da7d1315e9f9a19f1e5ca5.apk

  • Size

    2.1MB

  • MD5

    a256219c7503b58fac6e7c891344e6bc

  • SHA1

    101a9f37b2772969445655a7d160ef3f6d833fd9

  • SHA256

    32d8eff036f4d289311171182bdf956ab3eb4bb1f9da7d1315e9f9a19f1e5ca5

  • SHA512

    6570a09b1ce0815c3873c54d3798875f2b21fdb2c74ea19d16e4ea569cd06c9892a821712533f669226fbf4930b81731084771108271d18bb97d058ec253e7a6

  • SSDEEP

    49152:0rP0tdrFCbXQ58/dDlJHMCJhFqSW93UAE2foLVW4EEaRX6pQ6sH7fbgvHdZXxhIW:3jF7qv5MCAJcVWWaRqpVsbf0v9aef

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • jp.neoscorp.anxdroid.valuewallet.sole
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4320

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/.qjp.neoscorp.anxdroid.valuewallet.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/app_culture/OKKXhNk.json

    Filesize

    153KB

    MD5

    4927a872a790b045d34d575a1921b213

    SHA1

    1c843e7c0228dda5c346f6e68ab3ab69422b0c54

    SHA256

    27b3f7401862b082751f289fe74722b854143e7eae3593e27d7fdece38d7f92f

    SHA512

    6971ad6bb4b45fb4ab73a7d427c3876fc36321349f8c4cb73e4a98605c1782f9d489e758e597b4d9c02a9bf0971594b1764d4ba99daed95d30607e09059dec01

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/app_culture/OKKXhNk.json

    Filesize

    153KB

    MD5

    8a10aaa0ee9bf67c95a973c471229bab

    SHA1

    ac88f4d360c93971e502a53ff4ccab8ee0aef0a5

    SHA256

    b741a6ac4068f8564011ac10de838d644687a77554aa97763691e506e6e69b90

    SHA512

    7d990e39188cadac59775c57972666762a9a1b78e9667b65fa001a43ebd429370b8d23f84b0001fb8519c517b997ce8e2ad61823f14b74c6f999389c6756a683

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    45B

    MD5

    c4e8c02b90caf1882141bd3ff8aef3cc

    SHA1

    79b6ff1d3c9729faf376312e481e568ff9c11242

    SHA256

    30fa4954db2f829af50ebb90f66f6918efd4c7efd23461d151d21e96b24f0ea3

    SHA512

    d3449be4aacea3b08585749aea69c02eb812de169b9812c95748c0a55bb1a526476e848742b9b98d9eccefec23e6f0684dee72e675902dc4c648a22a43106dd0

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    423B

    MD5

    3df69447f465d210c446ae1a81852f65

    SHA1

    99e79160f71b39d104980caaa30b7b1a46b064e5

    SHA256

    2d7f2cd6aefe3c4071cd7f2ec8a1733c729ddb81d9167e4232511bb83f30172c

    SHA512

    9ddccbbdd28f784bf77887f171761fc3e57497acf29007b662826c8a3a867ea810d2ca68d8bd3a58f4dc72b5ef88e54d951b829d91fbe67433c46f5cf9b9109a

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    230B

    MD5

    ec8bf3677f28be61d07518d3aabdaf4f

    SHA1

    ab0cfaf20d49bb1e213d7f07cafd8b577220b5cd

    SHA256

    6ecb8909361d73e23a07f1cc1a9da90beabe82430569b9d6cb0ef7549c76d092

    SHA512

    6b577f509e930e31b7a90f946442a91f280e203c2213efcec83003266dafdd8f11b118fb590e1b2eb2c052d2c2a2bf11194c993efe20972d9189eed2b27471b4

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    54B

    MD5

    c8ace047389c2e3c7df391da9a9848b6

    SHA1

    7066b888e2841b4d52fe384acd0b5cf021c366b4

    SHA256

    771e6e8480374f3f68b9fe858644ef7a83be1906df90eec57035c52962bf250e

    SHA512

    d9e27e46cba79d3c60a91b42442db25aa17fdd1d2e4b14eef526155f4037adbf3fff6eb24d56858f4153d03762744e3265530a57ce6cf46a69dcf080c6fe9d4c

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    63B

    MD5

    8b4280ee7a737a086ed7eb6d34df6d75

    SHA1

    aa1f4ff926312c81186e6f18137e7c44531794f2

    SHA256

    c39697146fe9da260d66d2bf9abba59ded1d8ac718fb72009fa9d76714fa2fcc

    SHA512

    3020fa7becddb0e4ed7d5fdec74d186615f8e5e915ddba0c3eb7ffecaceb5423da660ffe8cd6b0e6878a75e436fd652d1d01384863fbb983dfe105ab04182fb0

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/app_culture/OKKXhNk.json

    Filesize

    450KB

    MD5

    65bb8115258b7d4900089a72148e6693

    SHA1

    d273f7a7fd0ebb1b60cd4f5ffa35235542e93292

    SHA256

    f5c734648edd05990fece37efe756bc5ac7c3f2d9bbddb3073d2c037b2b20067

    SHA512

    59ff998184927919e5db6eb7be59011035469954b945b9ea526f9175346d29d66d335b088935e856e9981a4c9a97bda4d8c1eba4e2461fcd4cd33bf380145826