Analysis

  • max time kernel
    146s
  • max time network
    144s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    20/01/2025, 22:00

General

  • Target

    9550871b333d7f620c02cb56822b91b656940fa7f833cfb48fc40471f6870664.apk

  • Size

    2.8MB

  • MD5

    9433bf8cd7c5f227289114d891da9224

  • SHA1

    0a48ae20673e4938e8cfe4cc062eb66ef522110a

  • SHA256

    9550871b333d7f620c02cb56822b91b656940fa7f833cfb48fc40471f6870664

  • SHA512

    b82edce3b092e048ce56a6c56b32b3401a0ec1005fe8284e56d756ee37084da7f48b85a9d5581f2ae1eef602ba9006ec8acb465cdc73b107e918ed7b3b0a59b4

  • SSDEEP

    49152:KvuEPfuOMJszChUUi7gL9GHO5gk4Y462Nn3mZc4lmzv+J1Fzi0taqMsAeeM5K3Gq:KfPbgL9w62Vmflmzv+J/GMAQSOTWsOJ7

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • homeworkout.homewosrkouts.noequipment
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4309
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/homeworkout.homewosrkouts.noequipment/app_system/EjwiBaj.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/homeworkout.homewosrkouts.noequipment/app_system/oat/x86/EjwiBaj.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4336

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/homeworkout.homewosrkouts.noequipment/.qhomeworkout.homewosrkouts.noequipment

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/homeworkout.homewosrkouts.noequipment/app_system/EjwiBaj.json

    Filesize

    153KB

    MD5

    65e6f2182a3424638a74716c089449ad

    SHA1

    f407ded28688059071fc054540a676c20d1bd237

    SHA256

    faace5580b30af5e05906a37e24decd9dfd69c4bd63686c9f26aa5fe0e3329bb

    SHA512

    05cecf36ae62d723adeeab057ee22763ef41e71280f7e6b9a30bcc11bb6eed1b03debac4ee4f96ae7aee7783b18a338a9f5c5c80ffc40e6fad5e9ecb4a9bfaf3

  • /data/data/homeworkout.homewosrkouts.noequipment/app_system/EjwiBaj.json

    Filesize

    153KB

    MD5

    a5d36a9ed2c90e42b1916a068729a3c9

    SHA1

    3b3e14047ba10db18bf5675b48abeb5d8e7dc614

    SHA256

    dca40b9c20b3c7df8b8f7236cab5d89fe6c78a7d0e80049593254ed8cb1637d7

    SHA512

    6bfc7a1d85f8279704d512375246e885c72d53a54229115418de42b1e3afe0f7d3c1718d00e62093bf4cb3e4f2dd0caeda7ae24d4fe861a4d2a9a943583ad1a2

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    63B

    MD5

    64d31199355a1ae240ff53c28c015849

    SHA1

    040c080e097c2ce2106c0bb674405d25d9a9acec

    SHA256

    a896e1db7e1bcd9a5a96e3bb8e286fe8c4ff218d7c6b65bcd65922d284f19f25

    SHA512

    c7ed0939ac6e027ca70e334b83c65aa4ce7fd61adaae139cd45e0cc046a192aef643ab5f1416bef4cb09925c7a839bf8716a5f930629713b4123d117e92b9f99

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    423B

    MD5

    f6b53f1611ee864c71d9cff42291619d

    SHA1

    e46a3a017998e538c2ba9b34853a714375e6e785

    SHA256

    3bda04467eb68c20a54f626ff0bad76d9cf54312171ebdfb0cd0d41f81de667e

    SHA512

    49088caa80472c4b36871bf80c9e21b54e05618c9c8196a76526e2fd1e409e12575c754bfc6232f84ad960f3890a16e0d3704dd550c575bbc818e080dbfb79d8

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    230B

    MD5

    e15e97e36af0be359be3c31737c487e5

    SHA1

    de9aa365353a53a2a8fab3e6ceb88cb4649265a8

    SHA256

    f5b41fd50f77b8fd9812a34bbf25c0829a351a0a134b2f67255bff6bdb45cfac

    SHA512

    8a16bbd435688f2de55ac5e70fb8fd4e4e30f23f4b14aefeaaa86e134d2070181ba05a045e450806d3d23abfb8c679e81b06a38641205c4cb073bb3f073bcb4f

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    63B

    MD5

    aedc7e3f096a56057b0f930c8debc491

    SHA1

    fccb1c73d9c57bbdbb2f42a727200ff45d56b8be

    SHA256

    5bfa9e8f9661b8165e1aa6be22a67a73589a7055355ca6778d3730fa461e90b9

    SHA512

    92f41664b9c392982cb528e47839dbc579f7541109ee045a63a79ea632e1504cce0560a5b601d5f7fd096a88e8ba7186e4e7348ebfa690a694dcd2e881d7a954

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    79B

    MD5

    736245bc677dbaa47d3da5edabe78e49

    SHA1

    a4cd6cf77a7e1a586721b1a9ec2a32638481b655

    SHA256

    eaa96479f0fc174902a1bdb38f9f17f1de3e71bbcbad60de7eb713db0effc17d

    SHA512

    eb90f69f4eff4b301b456c2949d343ebeceee110b832bf92da84d04d004f088e235b3ce39dc46aa2e6797426ff157c0257f72e510cb642b3f76fa5795c3107e7

  • /data/user/0/homeworkout.homewosrkouts.noequipment/app_system/EjwiBaj.json

    Filesize

    450KB

    MD5

    fe8211c318fece2e6a9b40cefe86054d

    SHA1

    cb116efc4073058d3c61bc849c20821291c51deb

    SHA256

    f82fe20157ac1d6e81268d5684129b0237bd8ea7f3f4355ed6c6ef7c01b1248d

    SHA512

    48e81146f0ebaa2194b693f6f4d431ef1f3f7c90b83064e4fb34f89a5e5c23d8a2385116a633e3fa23291929211b8907755f082ac41cc00ad7b7d037c10c00c5

  • /data/user/0/homeworkout.homewosrkouts.noequipment/app_system/EjwiBaj.json

    Filesize

    450KB

    MD5

    6666d3b2a41fafb1a0a6520a3863769d

    SHA1

    d83248a52e6d8a5dbbae0104418b1cd16e11ddd4

    SHA256

    23f92d2e21bc96e7f730645ca80ffc9560a17567991628d82ace4e2ab872545a

    SHA512

    f9c405f05e6427c645b4ec10a7a04bb4df150fb96a463b932c278cbb717db7db090787e5c67769c06fdf356f2c4b6707829c1a3bd804b75330bb45b8978fec58