Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    14-01-2025 22:00

General

  • Target

    eda0a2c444d4242872f6ed79a7a50656df825237c41d8940c5db13356ee1b59c.apk

  • Size

    2.8MB

  • MD5

    1ac1fc5be4404cd69d423f32afeef817

  • SHA1

    0925e96249005b8c206f3ce005cff34fd832c039

  • SHA256

    eda0a2c444d4242872f6ed79a7a50656df825237c41d8940c5db13356ee1b59c

  • SHA512

    74995fbbbda91851fd38b7c26cf3c5949a21fad8282f2fc0d93c2473bb87a2d5a71066f7fe33493fc54efcfa1bf23df619260c8f9e07975fe285080f8aa896d8

  • SSDEEP

    49152:h82JnojtDRtWb+R8+cAo993ymJYEaVMbgG4WT3QHkntlZRJ1qyNAEMlHu2GOLYSd:hzkYba8+cp99CmWlibQEtlZztNOdLYSd

Malware Config

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://otorisotobuyukisyan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineler.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoyukselishik.xyz/MzhiMTg0NTAwOTY5/

https://otorisotokontrol.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadele.xyz/MzhiMTg0NTAwOTY5/

https://otorisotodunyasiyasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogelecek.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoveintikam.xyz/MzhiMTg0NTAwOTY5/

https://otorisotouyanisi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakineleri.xyz/MzhiMTg0NTAwOTY5/

https://otorisototarihiyolu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoinsani.xyz/MzhiMTg0NTAwOTY5/

https://otorisotogucoyunu.xyz/MzhiMTg0NTAwOTY5/

https://otorisotopaylasim.xyz/MzhiMTg0NTAwOTY5/

https://otorisototeknoloji.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomakinasanati.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoplatform.xyz/MzhiMTg0NTAwOTY5/

https://otorisotomucadelesan.xyz/MzhiMTg0NTAwOTY5/

https://otorisotoarastirmasi.xyz/MzhiMTg0NTAwOTY5/

https://otorisotounutulmaz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • nt.neoscorp.anxdroid.valuewalletsd.sole
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4767

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/.qnt.neoscorp.anxdroid.valuewalletsd.sole

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/app_valley/eTW.json

    Filesize

    153KB

    MD5

    a55c4b52f4a99e25ed8b2221cff5b920

    SHA1

    3fc03492e60220c0f9ced508e4018863bee1d2e2

    SHA256

    688e502d5c220dbd5da13666044177ff6e08b4ab7022629d938e2ea42030ec2e

    SHA512

    013aacaf19a894add15c125720dc56d33553862118091ec3c8ea696b16d8a60757a0572c4c4bacf18d3149757e0ae270f91e2b5f79d41117c8e62cb06b2f7a8e

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/app_valley/eTW.json

    Filesize

    153KB

    MD5

    9a5e1f1db0cd6a20c02ed2eac4ef9717

    SHA1

    a00b07ba9588bd79459966107942258589e4ccc4

    SHA256

    e94b8b377ba2c2bfc72f897c5dda5c54be1c6cc97045f4da9643e962287e17f7

    SHA512

    dbd6dd9928112df83685e304c1d5d9cb523948232fae741e07eb9246abe20b737e43c2a89d66aa4a7a2d18352a2690c94c3c489848d3850c5671abe79554de17

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/app_valley/eTW.json

    Filesize

    450KB

    MD5

    c676d507f997edaac7511556ab7df1fb

    SHA1

    0c7a954bc1a4cab095705c4c9c280f7480cdecf4

    SHA256

    5fe4437475ce988c9201e655a128b417e1694e1b3b7dcde8c768bf99376fea48

    SHA512

    c84766d9281a431905e01cd39ab9ecba109ffa414dad45fd96dabf644d73ef49c8471dcafe20772a00555ce2bc5e6ccaa18614f1998ab8b7a3fd92cfcc40d842

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/kl.txt

    Filesize

    66B

    MD5

    31a5a6ba30a258af0cda5c2f9e03999b

    SHA1

    265efad0373b01c3f558c4f0aa3ea74331950e85

    SHA256

    b28e6f9932ef09da9b36ef61cc0a7dfaa3e7c7a1643e04896146040f2258b37c

    SHA512

    bfc1c6ff3ac60823372ae0a800b76519b0745488563d15a57cb7d865fd4c2a21c594a78bca99af0f5198ae9992cd7b27498a1a6dfc1d2cb263e9bc618d8e8ac3

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/kl.txt

    Filesize

    84B

    MD5

    276e76354ff66fa85d7a771bde855a45

    SHA1

    44839d2d31a31a9890150662ff3cee086ecf1386

    SHA256

    54638a27db3c31cc19a37999436fc53101e62689c4803e85e8d675d264a92d16

    SHA512

    d2bf68d4951565782fb8940d5ad54f8ee8823e535f7f76db6e16dda9d6e618c4bc6ab0177dabafbf69cae8f5119c1e3d7e596876ce6fbad7551e962624864d1b

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/kl.txt

    Filesize

    68B

    MD5

    c027d0a125f227ee6139e8a9280d1d13

    SHA1

    0737de5f539d23cd6186a726fe446efaed9fd211

    SHA256

    d07acd421b1bfeda101e792cd1552f760cbfe3958974d051bb4325c0f11a4222

    SHA512

    a7c59dd128ae588d58a546f027084674b598ee2a16ed14411c425d604890fede71f800e8b417c5cd95d4d6fc15457636df5be03dda000f08e13cda5d60818672

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/kl.txt

    Filesize

    230B

    MD5

    9c583067e661756dda6ea5ae80c209ea

    SHA1

    1e43e408f985b16de3ec2d7892e62b96d5cd1ad0

    SHA256

    4e53e73cdb52a4f4d72af1438ac6d424df92828d13657806c16d6c05e39d8080

    SHA512

    b65e4fed215a0f19abd94506e3e8dc4b75fb3afa5b36212a637e4ff1a6e0a1fe161e6bd8a7a5cf2dbb023f3ad6f8effe528933c5280746cb3fe1aff38ae5592a

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/kl.txt

    Filesize

    54B

    MD5

    63337999ced4ba4eccdd7b7cd4ecffc6

    SHA1

    14075c86d45b49c7ca149bf42454dee9a8dbd7f2

    SHA256

    b244955bf3bcdf965301959fc9ade5b7ae41665c8b86b12c47017d34d9232dd9

    SHA512

    90a6cf764c5191f217e778c35d2fc36d7969fc2d829b9026d1564501b7801ba4ae8b9d7533e02c8ab30a0f84ba0e24ea4b66a8172eb0117b07094c944073cad7

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/kl.txt

    Filesize

    63B

    MD5

    c2c96e9ecf4bceb99603a3142921c505

    SHA1

    a0950d295531230624fa413b679dab07234e367c

    SHA256

    28db4f241e1b2af7ca26c54aba4401c14439e0f000cc370060a98b4f8c0134cc

    SHA512

    3217be1ca4cc67dbcd5424a0f1acece37acf698d85047fbb414be0f5418f5fb66d603f825057da3eee934ed174784ef605635bf1f8e9b5cffb51c6c62bc269ef

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/kl.txt

    Filesize

    63B

    MD5

    91dfc36af0c21b3cbec34e09ecfdfbdf

    SHA1

    2fb6773342ea4dcd1028d6ef31053154b2a252d9

    SHA256

    5de1cab1fa9e58002fe899aa5ba32f953d4fb8897984789e1e86c168e70879f3

    SHA512

    7ed1c736d955d453f0a53e270b5c303c56ff28c6722f2972f2ad4c3978ec3a5620ad112601216102e48f3d249332ccb091e0aa417425c6c90ef47f150fa22eef

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/kl.txt

    Filesize

    466B

    MD5

    c00bfaa71032be0c1eb78115870f754f

    SHA1

    75d30f209a3bb14bf538de4ee9b094e6dc186543

    SHA256

    a7c75d0ee7c68b422f40ce6e822b289ec8aeccfe8d672ba5433c81a3b076aec6

    SHA512

    aeaa55caf5738dd8411a2af6946b282bf09948aa15e2344f66e0e57ea5113c063184a4cc681a03499664dc53a17d09600b487c4105e65f071a3eb56d5bcbda17

  • /data/user/0/nt.neoscorp.anxdroid.valuewalletsd.sole/kl.txt

    Filesize

    45B

    MD5

    1af76ea5c4eb907ef09e94dd5d56a42d

    SHA1

    dfa6e67e71b8aeec47e44c32f2e2a70ae8d0314b

    SHA256

    9ead5ce8e31c86e6e4cd7d971a8f32232e159efc4c4719a62edd7ae0698cfe81

    SHA512

    08e5a595a57129c3fb00e6fb9c28974fcec2c64487f11e61df7db81708da375c4898fe97303cda2ec3e29d2d7e6bda42e42d50174b82bfda4f5a666e1dcf1bc5