Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    13-01-2025 22:02

General

  • Target

    094b3060f5e71201fa3ced27b412658d8f5cc2211b3c452863ae7445c94e27c0.apk

  • Size

    2.1MB

  • MD5

    0b8d9044c7a2b37a11425a10cc0b0033

  • SHA1

    d578db0da216bb95dc70a1fe33a6a36b780665f6

  • SHA256

    094b3060f5e71201fa3ced27b412658d8f5cc2211b3c452863ae7445c94e27c0

  • SHA512

    a1f546ec03379f274a2f7b7a4ee2e84b0034c56b64549b05c31bdb6f7762996b88ee0ebd4e74df1cc7d638238c6675a0d3f316a0fa0f1f3d18a471e73e9e6f0f

  • SSDEEP

    49152:EgYpitqAvz6nq9Be2EVn4scs6NDgu0600RuDs8Jsq0svuO:EgYItqMz6nqhEV4rsoUuVwDXJsq0pO

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • jp.neoscorp.anxdroid.valuewallet.sole
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4333
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/app_wheat/xeUngBh.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/app_wheat/oat/x86/xeUngBh.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4357

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/.qjp.neoscorp.anxdroid.valuewallet.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/app_wheat/xeUngBh.json

    Filesize

    153KB

    MD5

    552f9ca80f67cc3fbe9c8cbc0721e964

    SHA1

    f2fd4c08fe6928f0a413c23b38278043bc3bd698

    SHA256

    d16cf3218843ae2871f6ad198343d6301f2e9247a795b770d27b54ae2260398b

    SHA512

    91a1d7923339960e85102db160e656f1cd4b817c393ced3a537a2a1b2341f9bd9c4f2f43316757bcdd5f151b08cd546f4fb2f164d9ed21adce496bc747df4e31

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/app_wheat/xeUngBh.json

    Filesize

    153KB

    MD5

    9cac12f4e2a92103a51dffeaba7dfaf8

    SHA1

    558bd2ecd400e1700339fa9b85f9376d6918af01

    SHA256

    f9ab1366320de42a7be509de41faafb952700103d39431dd10ec51181657a213

    SHA512

    15a9c372656b72f46eb8dae7953a2b5ad87da6b6ab17c49c08bc0df653addbb93dbc4ce55421dbeda2371753ca8d736635c155f7cd0c4fc88d5e24d8fb97dee0

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    45B

    MD5

    3bf2df743a6809ec75c0122ba56e6edd

    SHA1

    c55d1e668698e8872e4c04c5e7f8101ba57a8e6d

    SHA256

    a23693e93adfa375f8e5f6d0b3af67a3d4fd46f127fde14af9af081b9eba986f

    SHA512

    73d4e11e6b52261a10ee8753eadeaa68fbe3292bf3c50118adcdb4f2d605c769f84302d00fe48f81c1700beaec9337fae50c21d8bf7f986ec4f2dc4ca6310d1b

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    423B

    MD5

    180574b6b6e532e29ccd2b06018ba587

    SHA1

    eec142b109d2fb4af198def599c8b8dd5c4ffeaa

    SHA256

    ed73269ef10056bc90b2e6a8e323cd0df6bf1914740e97f0e5f2fc4616175d6e

    SHA512

    7b14a65c3ff78477b8821335ec5e167f28abf21a9687ddbb3eeb0e7c775bb62765db149e7976a0c9bfa7eaa3df5b7f729b0a1bb427087e97287509b1b68d0cef

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    230B

    MD5

    b2370669c28450dff8e4531ddf3af84b

    SHA1

    e5da88315b86a3a9b77fbb4cd812cb34966931da

    SHA256

    6ac027caca824de8ce14a2fd28a1da2ce1de477a999e4e41f699677aeb9e0b23

    SHA512

    ec55d267d8f382deda3ad59e382caf807f55b5c2da5b7c49f0a531862ccfdf1f8b0213ffa4dd4275d989e6cf7122da39fa41e7928c9cf8f86b9156dbc24df66e

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    54B

    MD5

    9f9d0d4d8443984e02d10ada8dc1ad65

    SHA1

    fe0a3a09b8ec12c31c23a11f47a008b7784eabd5

    SHA256

    c03603aba3e0ec0721f42d3dc1a7d714aa585edc40febdb46810f696d174ee46

    SHA512

    efda2d1133b9206138088a1a2f6b00f402182bc2b0d952f499b24b0efc34073eeffbf0221ccd940402b62dc21ab4c37788e6a406cc6b82f1f26d0152f39d1dc8

  • /data/data/jp.neoscorp.anxdroid.valuewallet.sole/kl.txt

    Filesize

    63B

    MD5

    17abca1b3b4152cf363e3ae87f4f9b12

    SHA1

    7f7b3ca112028226ef0d5b00d65656d0fab35b08

    SHA256

    3fb7d10117c8bcda0736e8a5d8c0f52e5ae6abd56b49c6341521a09b98dd04fc

    SHA512

    d3aa3e3c6db006af85ad5a93ce09f186db57eb911bac5e25494075e12d6f1f05734b1dd96e8ae24699e78ff353a37cd2921df57148849142b2d058af8968eaa0

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/app_wheat/xeUngBh.json

    Filesize

    450KB

    MD5

    0ff8831f5b8c4e7da3f616b2258e0c62

    SHA1

    f5507a66f528687143f9e770f89c6fd41ab6c267

    SHA256

    2532653edf05a0778e39973d58d36cc58395242fdb10b7198c3e62a4aabd2015

    SHA512

    36dc4b2d6a1e15bda3b91af5f979053f7680b856b08b141141f6b0a9019e2b3fb0e11e7e32304aacb7706ec3ab562f1f63cb1886477138759973a3a073c5e94b

  • /data/user/0/jp.neoscorp.anxdroid.valuewallet.sole/app_wheat/xeUngBh.json

    Filesize

    450KB

    MD5

    65bb8115258b7d4900089a72148e6693

    SHA1

    d273f7a7fd0ebb1b60cd4f5ffa35235542e93292

    SHA256

    f5c734648edd05990fece37efe756bc5ac7c3f2d9bbddb3073d2c037b2b20067

    SHA512

    59ff998184927919e5db6eb7be59011035469954b945b9ea526f9175346d29d66d335b088935e856e9981a4c9a97bda4d8c1eba4e2461fcd4cd33bf380145826