Analysis

  • max time kernel
    47s
  • max time network
    143s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    20-01-2025 22:10

General

  • Target

    f984a75cc9d17115fa6ef6bf89b4baed23a158a93a298f8e78a47f638f0b9695.apk

  • Size

    1.6MB

  • MD5

    0895a5702472ce0db8e0e21ace9361d6

  • SHA1

    c4c31b04ff6684795308423513ada5b5ebeebaae

  • SHA256

    f984a75cc9d17115fa6ef6bf89b4baed23a158a93a298f8e78a47f638f0b9695

  • SHA512

    27cb5d2d15fb9af87379de948ac3aabe72a31e057671974ebf7b3147b5bcabee9664e4ef80a6c66f779befd66bbaa0ca31967684f5ff64e847fd1aa70898da81

  • SSDEEP

    49152:CnFFDhRjBYoYXWsyVEbDRMnWc40aDFd4WS319V/ElSiljV4:CFRhRmogWsTBMnWc4jbJW9Vslny

Malware Config

Extracted

Family

octo

C2

https://hastanebilgimrehber.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletisim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkapsami.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtavsiyesi.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynak.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyolu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimgucu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimguncel.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyonetim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdestek.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyenilik.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynaklari.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimplatform.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogru.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogruluk.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimanlayis.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimhizmet.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkalite.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletim.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://hastanebilgimrehber.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletisim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkapsami.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtavsiyesi.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynak.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyolu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimgucu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimguncel.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyonetim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdestek.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyenilik.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynaklari.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimplatform.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogru.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogruluk.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimanlayis.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimhizmet.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkalite.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletim.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.techvision.smartapp
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4310
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.techvision.smartapp/app_absorb/sYfSpq.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.techvision.smartapp/app_absorb/oat/x86/sYfSpq.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4335

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.techvision.smartapp/app_absorb/sYfSpq.json

    Filesize

    153KB

    MD5

    2627d0e43d3f4fa6590e73e6644d6191

    SHA1

    a4c07a4d766be6780bd032050738c89e0d750afe

    SHA256

    215db84f3e6824823026da97e1a982706980bfab48583fa5b88be1519eaa5440

    SHA512

    ed5e54f23fa4ce42d43927b994e90b9a0b0e3c3bec351f79ccc383bd7b4eb8d1c32b51daf781ee1642d69ff6d8258fed299a00bd3bab453ec0b2b46211565572

  • /data/data/com.techvision.smartapp/app_absorb/sYfSpq.json

    Filesize

    153KB

    MD5

    3b85ff97f5c908b62b2d0059aaa4c8f7

    SHA1

    d1ea055f65fe5e2052d13b3df6e6eb0b9a457f55

    SHA256

    da214795b0124c36d95ecb439411853426e3420947088472aa306552b9b39a2c

    SHA512

    141630164f85085e4118f1f8617a6d70c8ce70de59f1c73f5a1c8c5b17c1fd076f9f8d4955320526d8e248cf94492ff7f048aca3df3f7a21391b87543b78a651

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    45B

    MD5

    451638349a5c2a27d082f37b39b6f38e

    SHA1

    8ce3710632a390588f30b334d9b2b7bee281b5e4

    SHA256

    493a02d963e713ca131ea1cb60eff5649a5f1d1c49455a1cc4176a4af07b1c5b

    SHA512

    7fcbe9df615e0bda4a59f3394c431a68b81a421dd0da29c3a99e7fac09c79e4aadb39fabdbd2c20451378f49b1a0d7c4f2f0edc61640f36221494e35d93ebb56

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    423B

    MD5

    e1a63bdd72930626a0fec9c27750fef2

    SHA1

    b83fa95c78f57b486ff2801b81085732d3ad08c6

    SHA256

    27d9e2108a908506bab3a7db3a4437ce0711305e9f43462944084017630399f6

    SHA512

    d33e17eb3f3877e3238fa318ec57b3c72df1060da9e81b564aac1141320305ada779578f0266efad6c3ecd0a37303dcf11b2aa51d52bc7b8ee5fcbc4a2a9a827

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    230B

    MD5

    c45ac28422b4157ee7a34b1840139ae8

    SHA1

    ba305494c36e991a136b3e9828bad7f158560d4f

    SHA256

    e53749f6b2768326871b85ef127b0ecb30cf7c4ecb164c3ff38921dc4253db21

    SHA512

    15ef7cf9618ea4a19853ef0f43b38cafc245129fdd9dbd69972dadff1b04eaea2e00e868dda4fa487f3fe6e29a055fd4c89b943a5860a02ac7954c4458493b4f

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    79B

    MD5

    212e148073d0d70d74b948664fe4bf64

    SHA1

    257e7e44c089e5a29412aa7e8ce72df7de47c2bb

    SHA256

    f9d6445f229fa22e9ae470ed6ee3b6c4f4f29a5288e11c24a2a59925c9e2391f

    SHA512

    026a575a4b92010d0b1cda689ae8dab8455ff335d39e4d2336e3a3f5526a8c45177dac359456f2d6e423caf519226ac322aa817b141b1f861c1d2b162c09af7e

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    63B

    MD5

    f302fc4681a0c9cae0e67a9b719295b5

    SHA1

    daf89fff13cb40734269f6dc849716c5249ed839

    SHA256

    7cdbc1c496293cbbe1b831d28cdbd05beccace8a7145e0ab88198d3bca7fc840

    SHA512

    d4c589051bee3f7f04f74f31d252c2fac4568d556f9f28f5fe2993a9d1cc0a587daacacc146e4e25a3336446333623044bd8e28182742b0cf3d8a356d8a576b1

  • /data/user/0/com.techvision.smartapp/app_absorb/sYfSpq.json

    Filesize

    450KB

    MD5

    666a637d229504552caf5254d5fd101f

    SHA1

    c1cc80f456ec181e0a7585c7968b33fabdda8027

    SHA256

    84836dc78f117ad778b49008bd639dddf78d6366eefd48639c76e9977498ecbf

    SHA512

    7a006641dac5b4cde6dbbb4426a87aaff77d64c9471cc5484e6060c1dbb1e17c967f26089b1a2d24dcd00d3c2e8b9c1423b6448138061b07f87e8bd49cb3664b

  • /data/user/0/com.techvision.smartapp/app_absorb/sYfSpq.json

    Filesize

    450KB

    MD5

    a26559217d84c32c2c8a0bb59f1ce1d8

    SHA1

    f0ea68ad2bd177d8a4216b21db87500f5e0d25ee

    SHA256

    2e51decdc36ac38ab36758a65dc87817eb319eff59b95f9c36abef0805671224

    SHA512

    cea40a37df07feba39b6b106c9a9741b4b026da56af50b63352c440c4388c4be83c5477eab690a8c33735201ed3e1f2eac344b3262036c2a4f948154132f759a