Resubmissions

14-01-2025 02:44

250114-c8enrsxjak 10

14-01-2025 02:23

250114-cvfnxatpb1 10

Analysis

  • max time kernel
    899s
  • max time network
    889s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    14-01-2025 02:44

General

  • Target

    3ac342e7438d6773c4f68ba650ce365c28fc21cba65d74d203cab96073bd1fad.apk

  • Size

    9.7MB

  • MD5

    6f6d8a63306e20ea2ae0dcd77928597c

  • SHA1

    0232745e94a9a0ff4db24ad7ae72a2f78daf65c6

  • SHA256

    3ac342e7438d6773c4f68ba650ce365c28fc21cba65d74d203cab96073bd1fad

  • SHA512

    9b0540a6b7617ae9bdef3c48fb7e60d4b5a60c987b83de71036455eeef79469162164a8eb97928be0e697324fe5424a471c49fd5655461ef79a146968812f02c

  • SSDEEP

    98304:1xUbWjuFS065iSRGZlVKNBOGl5X5Iu3HakICp+3X3RsPmuRhci5sstHRH8a:hACraUecakIC03X3Rif5sq

Malware Config

Extracted

Family

octo

C2

https://8bc1aee84c405b4da6592999520ca2b9.com

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.xims_navbar9
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4250
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xims_navbar9/app_baby/xFflkO.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xims_navbar9/app_baby/oat/x86/xFflkO.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4275

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.xims_navbar9/.global.com.xims_navbar9

    Filesize

    194B

    MD5

    02bd9744c3fdefb07f727e43f6ed3ed1

    SHA1

    d04c7e34eb28a34b75917c7f74b591912b810583

    SHA256

    44191dfcc2d33febd0d4cde3b1813512d5271c4c32e08e2b57acc82fd7c3f74a

    SHA512

    b174aedaf1360ece27417f84b1ae39ca68d861af2a65719e083b81d1c36359e7260c5508fe2407682292e4c7fcdfb52369f236999df3f44b09e0ea1a93c42317

  • /data/data/com.xims_navbar9/.global.com.xims_navbar9

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.xims_navbar9/app_baby/xFflkO.json

    Filesize

    1016B

    MD5

    1110f2f6204b08294e5b28dbc53d8cbe

    SHA1

    c83539a778819cd38465948ecec65d43fd1a2510

    SHA256

    e065df3cca5cf9461c94e882253804d1dec26ccf6090eee6aefc7954347a770a

    SHA512

    44df88b4c487be9a8c736bf363c4642102d31d3db1b6264887136ed8a0861c96c5a1ea94dd198d79c2c5c35d397bd353f6b4c693bf125362e66f8940a36fe72c

  • /data/data/com.xims_navbar9/app_baby/xFflkO.json

    Filesize

    1016B

    MD5

    f8ece4397587e88b5fa2046db01cfefc

    SHA1

    dcabe5297d0a3128b00e0b311d424607f7553d7d

    SHA256

    9b20e5e66d63812d7a4cbe6b579a89ecf4adf8f83998b81cdf85243ff4456d46

    SHA512

    22ddca672167394aa4dd72731a684b93ef568680b54a7c4ff677def46a8730b67d05cba97580339042cdf457969100f0140216801259f82e717930b98294f398

  • /data/data/com.xims_navbar9/files/.s

    Filesize

    307KB

    MD5

    4e73947cabb5db3f92ca85004981b754

    SHA1

    6d9667fdb0280ed2dcb782b4683e422a51bdc601

    SHA256

    6db94232e756b90ed437f1bc87dc38cf20fb2e7c7a19a5e40c6c17254b7e234c

    SHA512

    be8b500a7070af1dfb53b0cf1a7b327dadc4e163a6dad905496ac228c58cd1ed87b054533917924455d35e9b300683ae33e1bcdd91935a5dbae1d693c3e13d69

  • /data/user/0/com.xims_navbar9/app_baby/xFflkO.json

    Filesize

    1KB

    MD5

    416bafd713a3f86f2634162b7b52594c

    SHA1

    2d42930208395f9f3de781b0aef3cf5fa08d6aa6

    SHA256

    faecdd52b2844fa950f673f38e49dff04502ce055d18e98aba126959a87c1d41

    SHA512

    3b48ab505662447e7fb63ed502717b3a83b1e9986f852ce1c35b5316522bf9c792e461cc4fe6a52f200d79682efa33b7d2591e10618658d2708997d398a54623

  • /data/user/0/com.xims_navbar9/app_baby/xFflkO.json

    Filesize

    1KB

    MD5

    32ef4167cdb7f36dc75a31e63f614766

    SHA1

    b898d191a1a574b1d6fead031be849e8d1a044f3

    SHA256

    53fe586224ab636310ae31153a8897df707aedfafc86fe165d0545982a2cb4c4

    SHA512

    bb576d760815dc37fcef24118c19125a97078ad370c1f36d7ea98091c2d1c22250928d25ca51e3ed68c7b64a334b38295b99c51d3618e9837876a5a4ebac3c2b

  • Anonymous-DexFile@0xd33bb000-0xd343f0a4

    Filesize

    528KB

    MD5

    00cde1bef497111932c43025a15711cd

    SHA1

    aee2240ae3dda3a883233b880df5af3d033633d3

    SHA256

    ec54f882a399861934f662b1c871dac4b85b17edfbb2ef42a398ed1379f961a4

    SHA512

    9012e85bda8f0e59010618d5ff9294a1e2ed13a27efefaa1b393710c0569c8ba9f326867b9133244982830f106599088c4a0f49f6b2c45cfe351d19849af9f4a