Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    14-01-2025 22:00

General

  • Target

    e4bd5ab8e2e6c66dd65d4f579f95f43f7573793e3ad46ac47ba546d8856e2f8e.apk

  • Size

    2.3MB

  • MD5

    9b714cafbeceaac64e280e049e2ceb6a

  • SHA1

    e2f1957d438ca3ca4e7ab0947d95fd30f73e07d0

  • SHA256

    e4bd5ab8e2e6c66dd65d4f579f95f43f7573793e3ad46ac47ba546d8856e2f8e

  • SHA512

    01ca351f05c9d5700f42d08596f65e044d14f81dbae9dbcbc76abe3104742a10caec3aaf1e7abead9aa1aeac7235eb58ee1c91800e14145a6f3418c158e517f8

  • SSDEEP

    49152:psuFJc9HcGYdI4/rr9M9GwtnfgLMx5M1L9jRXemyG3KxWve6cY8rFoCi2MpRy0M9:psuo9QdI4u9GwhIIU3jomyDYvrcD5oCD

Malware Config

Extracted

Family

octo

C2

https://hastanebilgimrehber.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletisim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkapsami.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtavsiyesi.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynak.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyolu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimgucu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimguncel.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyonetim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdestek.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyenilik.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynaklari.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimplatform.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogru.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogruluk.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimanlayis.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimhizmet.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkalite.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletim.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://hastanebilgimrehber.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletisim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkapsami.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtavsiyesi.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynak.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyolu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimgucu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimguncel.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyonetim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdestek.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyenilik.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynaklari.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimplatform.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogru.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogruluk.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimanlayis.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimhizmet.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkalite.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletim.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • nt.neoscorp.anxdroid.valueweaslletsd.sole
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4321

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/nt.neoscorp.anxdroid.valueweaslletsd.sole/.qnt.neoscorp.anxdroid.valueweaslletsd.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/nt.neoscorp.anxdroid.valueweaslletsd.sole/app_leaf/qJuD.json

    Filesize

    153KB

    MD5

    b54b9bb1d8c4249ee03e93a61f76e47b

    SHA1

    d3ebc3aa83a4c0baa1cafb19a23480682d292854

    SHA256

    3e251aaac3cd381d8701bc8b2a6c42755ffd645013f0f2d59fd8d207ff7e70f9

    SHA512

    ea5e0908b6eeb2d988b2dd5ba34099f9f82fc68a513220c6e18b81e3d10252131e68a1147786361fcc2b303ba79f665a16749d2a8c7db98bff1db3919007c42e

  • /data/data/nt.neoscorp.anxdroid.valueweaslletsd.sole/app_leaf/qJuD.json

    Filesize

    153KB

    MD5

    161f8955b847e8d3468a7160f4ceea82

    SHA1

    8f64065c8079fab4aab00052be359ddac911b11c

    SHA256

    980fe92acc4af8db1c1bcb782048e18483a9921e71c19344f769865ac2d7108a

    SHA512

    9de00440d6a030d43193ba793f03c3b77d0980d609a6319184429c0f11c20fb78d5a9d594d7b73ba7cdb8c0cfb661d9c390633e26059645bcac4247920744107

  • /data/data/nt.neoscorp.anxdroid.valueweaslletsd.sole/kl.txt

    Filesize

    45B

    MD5

    b1479b0124d371644b94968b8f9a0da8

    SHA1

    6dd21e6eaa12b2af616e35b357c6393325fd8d4b

    SHA256

    860ff33936866078682fd4fb27c774f274170b022f3e00bac235ad36d6776db8

    SHA512

    77857a4f9e4422c063549dbafed95bffd7eebf21dccc5b5683d5519a221c1e7fbd50b658d0622fdd4083877d768e6742bc3202edd9374b2a36f46b53c295bd50

  • /data/data/nt.neoscorp.anxdroid.valueweaslletsd.sole/kl.txt

    Filesize

    423B

    MD5

    a0f4ff6086cc47db7289948aba4e639c

    SHA1

    088d37326abe71753fbbf0d47e6f14ecc783410f

    SHA256

    a5b5e691d6d1f8653ee4f729d693867a62fe7be4792aecc08dcad1b4771afa93

    SHA512

    0927ef139355e4446a29009ee0302d5d10d1b73c3687313e1960b78c0ac6842097bcd2a775fd9c87ee5a79fc34762d1efce0b1ae72dbf51a5b2b25c0fb6f61b8

  • /data/data/nt.neoscorp.anxdroid.valueweaslletsd.sole/kl.txt

    Filesize

    230B

    MD5

    84a215dcbd3adb46e61e5e417d4a66ab

    SHA1

    186b7124537228bc9ef120324bdc785c5dee4245

    SHA256

    73569d9ed12c1fa38abdae111730464b070df7749114c213429df1d895e44764

    SHA512

    fce4a5b2e5acce4f06dce4b5bd5a7f1e53f0bbd94244f0f7890b904c3f8c929c4a1651c68b252361e1f32527323ce315357a98a3fe27af888db498e9d1d84e18

  • /data/data/nt.neoscorp.anxdroid.valueweaslletsd.sole/kl.txt

    Filesize

    54B

    MD5

    582611bf0e5ed7f6e126012a79ce32a1

    SHA1

    4eb2e92b75e53b1c4249bfc6834ee42e7c5bc4b7

    SHA256

    2e7634c69b9132f50ddbbc9beaa6b2244cca6a6787ab26fa611908215c1dc808

    SHA512

    c4e94f4800da3e70384db527381c7cbff58e2223d2bccdb30f6de37e0af3334e4945a83d5b335fff066095c46467e5a5352a5973ad409cae5f82d4010af8a36b

  • /data/data/nt.neoscorp.anxdroid.valueweaslletsd.sole/kl.txt

    Filesize

    63B

    MD5

    073d80b74b3244330990ccc7ede93513

    SHA1

    12f1f0c8250b5b2f463af3647373775f8d5caee2

    SHA256

    05c6ede5042a85b356c793562a5bfbf3f8db0f03efd17dae4cfdc27cd0ba838f

    SHA512

    0239f4b86a5bca477fa0179bcaf6b24458c05e719ce25db008c105c353b4fd02960bef00cb0983d29dc6d810348a8d6e6d355a9d1ee7875115463cb1ea2d58ec

  • /data/user/0/nt.neoscorp.anxdroid.valueweaslletsd.sole/app_leaf/qJuD.json

    Filesize

    450KB

    MD5

    89243960818c1c09c1cb24b04f67faec

    SHA1

    593160660db3c7042ecea68687b63a454d19e440

    SHA256

    c305a073d24953c41b175ef45d02e03f73419e6809a7ab1b0f774550f768fb73

    SHA512

    52ae77c8985026d89ed84601e9a6e072f0556839e207866f9e053068858e68be9a814d2ebf7095c2e0814252edeea4715557818e029ee76fe1eec575f7aa8601