Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    20-01-2025 22:05

General

  • Target

    a75b42d29d6b9e50a9292edb4b6ac7907e724aa83d8fede9770d23bcfb44b01d.apk

  • Size

    1.8MB

  • MD5

    bd87b8b3bb4ecc9292d4c5cff7607870

  • SHA1

    50bd030ecb598f659c1b7b9a2dabd78b071abcca

  • SHA256

    a75b42d29d6b9e50a9292edb4b6ac7907e724aa83d8fede9770d23bcfb44b01d

  • SHA512

    c00485c87606e5cfda8dd0312267fe68bf7195d287c1c69fabbd4ac23127255bccf9f65e4750093060848a96a16d69ddba17ad2a3bf9bbc8bd32d56a642ee890

  • SSDEEP

    49152:f+klyxKyZS7VkQ/D2pRTIRZSjDRrSEpwySgHYQ8QP7u/DKP:f3RyqkMSp0ZSjDRWEqySg4Qbgs

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • homeworkout.homewosrkouts.noequipment
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4310

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/homeworkout.homewosrkouts.noequipment/.qhomeworkout.homewosrkouts.noequipment

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/homeworkout.homewosrkouts.noequipment/app_plastic/NLYuIUi.json

    Filesize

    153KB

    MD5

    9186e384f7ca5241d92128643471b3a1

    SHA1

    d2656e918938856e86922c43a432baf0ef49fe76

    SHA256

    f0cc5716b07e790965bdfe9d0c8efb668f0b91a4d26e5e5a2bbdaa4a1331966c

    SHA512

    bd1b9d1621020fd8845a04c254b806d23f86c40e1ea001d93f2b098a0f92bf45226d510796de7247d59f527894502844cbe651bbe573312b9e8c8da8e380834b

  • /data/data/homeworkout.homewosrkouts.noequipment/app_plastic/NLYuIUi.json

    Filesize

    153KB

    MD5

    c6e4b78f7efe0071a15b8783900237bf

    SHA1

    fb0ee9fd427c8dad1e7b62871661bfe302e4699c

    SHA256

    89d0fff6606381ff24050d1e9597dba24b955b791347aa3f0e1b16c62c565ae0

    SHA512

    9728cbfad882a0d743f33181def375d65f4fed747ca7c9c45cac0f0e0e0fc6e8528453b40274db388ee19dcd776d65aa7b9d500060d89a1ba5abaed84ae7636c

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    45B

    MD5

    56d1b858e662cb0bc380a659fe531b28

    SHA1

    ddedbda82fd74f297ec8894417b165c910a46446

    SHA256

    e8ff6d1d5df86452ab77a112fabb6724e1730fe5d5a8aea0c055e4b5af766fa3

    SHA512

    deb2e83f631034105635473933561da78b9b164915a6b54a722f0c8082ae4291f6b198d510b14bef1da2231eafac10d82461c09fdcd6479681561ac4bcddf5a5

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    423B

    MD5

    844da7dcb2768c068a0cb16f4af475df

    SHA1

    cbc637b3c0dda9df36f767bab8b504738d79ea2c

    SHA256

    bc86478db3a25763520ecffdaddc11149d75b5236710ad5e6380bb4e709f68de

    SHA512

    9b2443ca4f3e826c55985132fa4ed7cfe3e9e76b332578858e5056744a537f4baf8c9e8350599ec9da3e257efd361a4c92eb3c1f61def07ad4cfc26a4025657f

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    230B

    MD5

    ba33245d15b77e0404d582b45b326847

    SHA1

    c325580f51433fd75a74f94f6bb791372d0181d2

    SHA256

    b6bc4de508d710f0901fe1b5cf29436ad59ed3f408a4f93b376aea39e2ecfad7

    SHA512

    22fe6bb5d79f095119b14715651d38258dd07dccf5bf101f6c3d3ce050f6387eb5a7e309d3846b19df65ff74f9d5b8144c2fe1961aa2bab415cab16af1b121c3

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    54B

    MD5

    5ab4248d98da9c0094d613396552fb15

    SHA1

    ae6c93151c773ba54ac4c1efcc0d8f2ac9be1f8d

    SHA256

    cae34099da64f78ac34261be860c571db68e42f032e93264bb2863eb8453ef18

    SHA512

    23e44a7e0acc2f7cb65bb2406fe2f2d9ebd0f7714fa258789b7bdec39365ed55456f515edeb229cee7119d8eed3000b64f45ddf1dccab678d6b80eb91f37f474

  • /data/data/homeworkout.homewosrkouts.noequipment/kl.txt

    Filesize

    63B

    MD5

    6a74333405502d03ecff262f84be21c4

    SHA1

    32a4fee89a846fb6926e5c48ec6c80306960deaa

    SHA256

    f2b3965a80eed6b6a622402c4dea044e85b31bec04aac65590b45f7618bd861f

    SHA512

    78e7e732e73d67f1016b3a3d988b23fa9733b7c07a94f8ae0087796c1e378d18fb2539b8907cfa2fae5cb4cde4050fe4acecf0f5360af12e6a4a46120650191c

  • /data/user/0/homeworkout.homewosrkouts.noequipment/app_plastic/NLYuIUi.json

    Filesize

    450KB

    MD5

    6666d3b2a41fafb1a0a6520a3863769d

    SHA1

    d83248a52e6d8a5dbbae0104418b1cd16e11ddd4

    SHA256

    23f92d2e21bc96e7f730645ca80ffc9560a17567991628d82ace4e2ab872545a

    SHA512

    f9c405f05e6427c645b4ec10a7a04bb4df150fb96a463b932c278cbb717db7db090787e5c67769c06fdf356f2c4b6707829c1a3bd804b75330bb45b8978fec58