Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    20-01-2025 22:10

General

  • Target

    49a17dd545658bfde2feb59c6419984ce325cb5379bdc51ec5edabe394cb6440.apk

  • Size

    2.4MB

  • MD5

    923a1813f902e23a1791c348ef22aaee

  • SHA1

    797888774cd769c34902ade8c245cc6ccb656bb5

  • SHA256

    49a17dd545658bfde2feb59c6419984ce325cb5379bdc51ec5edabe394cb6440

  • SHA512

    99787bb10a1494036241ff4ab8835af6dda59b7c9c6d98f1733f587f60c11e27c4f7d98f14523c2adb1ec7e66233212df8e480ea40df1f0d10b1a97d688da6eb

  • SSDEEP

    49152:WIYYal3jeMBPVFW/9hB4YMARe7nK6pCbB2NzVNaLk9irmL8LMtHWhYytSckjCabN:WIYe2tWhB4YRejXgsNzVNaLVrFLMtHoO

Malware Config

Extracted

Family

octo

C2

https://hastanebilgimrehber.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletisim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkapsami.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtavsiyesi.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynak.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyolu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimgucu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimguncel.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyonetim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdestek.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyenilik.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynaklari.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimplatform.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogru.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogruluk.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimanlayis.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimhizmet.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkalite.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletim.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://hastanebilgimrehber.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletisim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkapsami.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtavsiyesi.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynak.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyolu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimgucu.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimguncel.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyonetim.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdestek.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimyenilik.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkaynaklari.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimplatform.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogru.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimdogruluk.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimanlayis.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimhizmet.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimkalite.xyz/MzhiMTg0NTAwOTY5/

https://hastanebilgimiletim.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.techvision.smartapp
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4320

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.techvision.smartapp/.qcom.techvision.smartapp

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.techvision.smartapp/app_typical/oyDR.json

    Filesize

    153KB

    MD5

    18bf3b86a856a780b9b7da4d2f360c9e

    SHA1

    2ce426042ee44d920a60e8984d83e18b3f73a4a3

    SHA256

    1f00df0e1d6926d1e085b8ec9d11fb1d83d27957f5afa559e5b71a730f0cc8f6

    SHA512

    12f44cdca4b923d1f408f43fd98b63cdffce7da12f538e755e587e047e8fc660e536dfc0a5efe78456750ca1d23728a8c96617bd545421a9871601afde1de77f

  • /data/data/com.techvision.smartapp/app_typical/oyDR.json

    Filesize

    153KB

    MD5

    89ce39f5ab84adea58b22ab97efcd943

    SHA1

    8727ad9bc33283ebf1e2410f2c24de175e6214dd

    SHA256

    5bb135191da9257bf8af41302fb5b3a593a7950d3b4fb9c3dde57fd1130e6164

    SHA512

    11703c5eaeaf2bef25febae482933174ef16913a5a41333374085d1a0c9acb9be11e0d2394f55c52d4d1bcae0c77bbadad9f7bc53ec0095f9ce9870cec6150ed

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    63B

    MD5

    a7c7feff46de3de7f3392ecc89a0c022

    SHA1

    b0dbecc7991567d190b5caec0e58ab4a61bc4d5d

    SHA256

    86ee7b52c93ce6f1baa1007a9855ba57b13f94cfa60de4bbbc6cd5e616c5cc0f

    SHA512

    e53629d6b749964d62add3b2d232f97ec96b900c1bd7488af79aa7a4cd575be8337e28cfeedfbcdbb1e3a5eaeeae48a47716c49ba0a450070565004fcf1e55e5

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    423B

    MD5

    815a09eda052b0f8b2fb34bb842c294e

    SHA1

    8386f11112b561b5d96001530a362965043eb276

    SHA256

    4071d2f3e16ff7c504e6e00cefaf0c4afdd5116f12d004a4cad787011a7d326a

    SHA512

    d451a0b774fa6bafe865bf03d25fd2cb5796b974bd84582e85d2c88566ad7c819bd1d0d898bb31a1efb8ea8c9103ed311e4d80613713f467ff5804b0c2deb242

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    230B

    MD5

    b8b7ef2494d9cbd59f35a55592b0cc73

    SHA1

    b201f089599b78b5d7a64215706b499b5b93592e

    SHA256

    9a1304b25d545a99fbea5c3dd31030f747454c1db61ee07a064ba3b2cf0be3dc

    SHA512

    6a5a81e9e5018427e6d9291aa5c1d7e4e20b1673a732f45f339e9203749b20fc96476fa65b99ab6c5c99a3bc634abf9a087b5b4786dfb872d5d6b146797a9e1a

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    54B

    MD5

    53d5e26c7d4d8fb1df8a365dde0d9665

    SHA1

    f3d2e798992c3f0ece53213f237f939db0e27e61

    SHA256

    73364e73ecae8733d7fbef3b7df607d77726c2e7270bdcad8c7a66785b5eded9

    SHA512

    e5713d84f6551ac99aa3520ad662660be36e7c71e77ed6b4002c5234ff5b64d6356d6b18e55cf3bd2a0ae123523a76247d2144e8f22d022f2e60902a331548fd

  • /data/data/com.techvision.smartapp/kl.txt

    Filesize

    68B

    MD5

    7aacab4750fc4005b06aa28be3808fa8

    SHA1

    2c0971dd36a81a44560753f4e2f1b545600f5162

    SHA256

    3a8dce6717414bcffd2629835fe6e82dc7db4c04c92825068b0d7ebddf02ed0f

    SHA512

    df1f4302bd1074dcf17c49a27863631cfa15a7fc60dd78f2ea037fd0c1ac7555fd2cc53514637e050710a0401a6b988ed4a574760e478bd68fc07a0c8d2df20b

  • /data/user/0/com.techvision.smartapp/app_typical/oyDR.json

    Filesize

    450KB

    MD5

    a26559217d84c32c2c8a0bb59f1ce1d8

    SHA1

    f0ea68ad2bd177d8a4216b21db87500f5e0d25ee

    SHA256

    2e51decdc36ac38ab36758a65dc87817eb319eff59b95f9c36abef0805671224

    SHA512

    cea40a37df07feba39b6b106c9a9741b4b026da56af50b63352c440c4388c4be83c5477eab690a8c33735201ed3e1f2eac344b3262036c2a4f948154132f759a