Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    20-01-2025 22:02

General

  • Target

    7bb2d5e838d082dd684f2d465a1c95ba20e3f65b2a4c088bcf4684d8153a5348.apk

  • Size

    1.5MB

  • MD5

    a1d3ee3febaaee0a114dfe63b46c2a08

  • SHA1

    d19cfdf3542bcd0b6d30275495da8f88c43191f0

  • SHA256

    7bb2d5e838d082dd684f2d465a1c95ba20e3f65b2a4c088bcf4684d8153a5348

  • SHA512

    71b287ec3f035a64d0d6d26c4a6dd352f32b6f3f4c491e729f9956c2c3a4ba38e052728161de7dfc3c6b4d2ca0819dc61f2fcce2517ab31c3ee1ea2f23f7f9d4

  • SSDEEP

    49152:w//dzvocNfQDURo0CyFGHkrzVCO/TrNPj2wZbr2:2zvnNIYrCkMkrEMTdBZe

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • homeworkout.homeworkouts.noequipment
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4334
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/homeworkout.homeworkouts.noequipment/app_broom/woSq.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/homeworkout.homeworkouts.noequipment/app_broom/oat/x86/woSq.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4359

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/homeworkout.homeworkouts.noequipment/.qhomeworkout.homeworkouts.noequipment

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/homeworkout.homeworkouts.noequipment/app_broom/woSq.json

    Filesize

    153KB

    MD5

    2c14a35f12ebe71dcaf4867aa2930195

    SHA1

    f1160bd514c552c72a3ccad83dbb2f6c7620f4bf

    SHA256

    c8f6494fac0b288c997f8e57ade16de6ff602077b2e502a6102dcb8e7feeaf06

    SHA512

    d29748c54194bd3dc2c7f6101c108788a427beb5b2b930b7b9f74121debdb7629daca1c6d14f0c3d5746fa99df9b00e3da583e5a68a8c925d85ba802dc6acece

  • /data/data/homeworkout.homeworkouts.noequipment/app_broom/woSq.json

    Filesize

    153KB

    MD5

    28d57c14f5a496ae3ffd47b226b485ce

    SHA1

    dbe0d40def07451ebe9f28742765cead0f2198be

    SHA256

    1cf821870c87d8ef254c528210dd998fbcc4f86eee971273e7fea9e280e7f354

    SHA512

    b2dfb5fe25a5588c383b21d576b1c19e0ee84dfc67513877c4ad5f7535ce9891e864be1633b757e6aac2ecf90279b21b2e1477a9414ecfa134b7cfab3deaa4a9

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    45B

    MD5

    2cb1257a0014fe1b46aed902c5bab738

    SHA1

    49245758ece2638564c5d93509ea3f773afba99d

    SHA256

    0755547fc77ef2c92e23d7c0006819b231908edfa9c4bb1437848d85ff30ada1

    SHA512

    dc02587904cfd44790993434653c6a3aa85aaea7207278f0769918018b409001b97bb2a2b7ce4f1a6cec7978bc56ed147bc7cb772502c92e79646801f11da2d7

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    423B

    MD5

    fe4e6846ef685c86322aa8219b5b8304

    SHA1

    7b695588328cdedee91965d5e2b9a98416e5d7e1

    SHA256

    d3e4588eae1c3a977a0b00e9ae76a3eae2d80282c25982fefe4c62214da3074d

    SHA512

    cbc362fb83fd6d368f943aaca03f7c28d4b6f0f2596741c1bea122d79475843ccf529e03fe7466f31dddfb38f412d15ceb0c7ad96b20b1ae4730e049f8afb48d

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    230B

    MD5

    7ece66930a6acb919e7c39fa814ae0d7

    SHA1

    a4b7091594901a8e506335b8b21e06df59430d29

    SHA256

    13e41b54eff4f22f812c3f319139a75f9836f60424f2edbba98366686125dd93

    SHA512

    83dcc8155be2e6e8661324573e7ca0609b58a8b081cd32e2dbfa5efdde47da393f8e368719c4306224050a6c1c6c1f08b0f7fe22852e039bd3a620b8858be45a

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    54B

    MD5

    4c594f817020ae7c0e0baf8d95e28869

    SHA1

    e05930fe4f6c2a115e6946d420e279f93c4a3db8

    SHA256

    02749ac3fcc95a55e239e32bfab9c806c55717773df2afd6d3f4937bd252400b

    SHA512

    bead0469a9c1b68d67c587fda361e7c3ff237ac6c1687f51c48b33be563332d42fcaf4f1166794879196f94a758dffef7b48c86daae771ce4ed985bea8b28b9f

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    63B

    MD5

    ac7cba98a0ab1a326d98c7d72cec901d

    SHA1

    16b6b2cc29310a05006c66456f2bdc7d06f0ffa0

    SHA256

    a12f69cba3ead05f3cb5494b39b8ade07e37bffdbdc014109bc9013648a2d238

    SHA512

    66f892aac6862dc82bf1045766f0df9824538ef54b53aa0c0b396d3c855227803c94aba13f1d5f353c46f66d4eec19bbf438a4914204936449c44821b5f23337

  • /data/user/0/homeworkout.homeworkouts.noequipment/app_broom/woSq.json

    Filesize

    450KB

    MD5

    140931cf5ec9f734aaa6a411154b3e95

    SHA1

    346ea44390ae8e3c486a384c494470ef904178c5

    SHA256

    e498c4c2ecdb6c9f2ba1ddae69e264659df3909d222f881bff44ce72a43505e0

    SHA512

    7552edd6b197351f54898b44fb7b89ab84c6004e8959a8b93925e5e4f27c454035af66ae9146f13f1ea31876e6716c3fa295ccc2af16aa0faed63736e72855f1

  • /data/user/0/homeworkout.homeworkouts.noequipment/app_broom/woSq.json

    Filesize

    450KB

    MD5

    c186e81d554e3718b88b544fe5e0ab41

    SHA1

    60bc93ba5f26b03f6dda1b45a373af9f0ff59ea7

    SHA256

    9fe9deda80a8fa54b59d75d7782cae2a0b4c89c0ad026f3ff223e04b79d1326f

    SHA512

    1cb0b2fd7517e11ee12b699b97b45ae947a0bfbcedb1be21882680419199ffdc76381a1676abfb0df62ae45d21b607b1ea7356d81da4596e6ab09e6d78ffcd73