Analysis

  • max time kernel
    38s
  • max time network
    154s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    21-01-2025 22:00

General

  • Target

    bba06962feb962f6619c5caad2ddb49c1f46f848397999405424e479efa7f2ca.apk

  • Size

    2.4MB

  • MD5

    393e6aec7d139cdd445a15713075ee94

  • SHA1

    fc80593b5c159f5981a3227904c8914560014b61

  • SHA256

    bba06962feb962f6619c5caad2ddb49c1f46f848397999405424e479efa7f2ca

  • SHA512

    88e8569e571c2d00e4fcd94364a2fa65140c39924a085f44d8c4ad3d3d22da837080cdb4b68798d99e1178aa8830fc429437f2263d497b27cd613979f2446c50

  • SSDEEP

    49152:YVwE89T+UaQTZ9o62Ny2zhlqRaMrReoG8wlBzRc0dPkIF1o7jw5odrFEfleeEd41:ohP69o62k2zhgrReYOBzRcuPxLo3wGX8

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • homeworkout.homeworkouts.noequipment
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4247
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/homeworkout.homeworkouts.noequipment/app_split/FiGj.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/homeworkout.homeworkouts.noequipment/app_split/oat/x86/FiGj.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4272

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/homeworkout.homeworkouts.noequipment/app_split/FiGj.json

    Filesize

    153KB

    MD5

    e2ffad92a2c9e8d4087b2f6199fedbbf

    SHA1

    1601eb64bb88867acdb36278aa2f0ad260adbee7

    SHA256

    ebe33f2b046dddc3d1dba688ff8a58d22f41cf6f309c343cf4767706a7965118

    SHA512

    95d369e91cb40acb6990332b50266dbcb2f62caef5a9d9a30d05f903fa1caa25ae06545635634cd9f989723a5d5fe38d91eeaadde9f63fe39a01e6dd48758839

  • /data/data/homeworkout.homeworkouts.noequipment/app_split/FiGj.json

    Filesize

    153KB

    MD5

    798c770a573fa413338f5ff41b95a856

    SHA1

    39becb43c35ee69047c90a3c8ff91d04b4bcc4e7

    SHA256

    fd750d09994f0f9848f1ec4ff17947f54afec8e3cf36a64e0e37c4fb6400a81f

    SHA512

    f53622dcdf96ec1a93b6dd83933f3bfd4044515c6826eed7b6d15c603aec8b5f030e7621aa9cb5bbe58db1ad2bf80936b83f5e6c442e31058099f43ac370bba2

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    79B

    MD5

    a0574de5979b756c6f07c14f97d64295

    SHA1

    452e7d706a3f61cc4667901fa21832e28d0e3316

    SHA256

    10fd67da34c64b99889246057d7335a8a7dab94f585fc109558084140a619974

    SHA512

    5341df95871c9219901f40b966707f462dbf7a610b049936143c442441fa163ca08245ef44b0835971cb52f364c3e167b1e0b3cd2ffacc6f0e867b8b81f358de

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    423B

    MD5

    f38936bb34f2e7bbdd52d20175e8c15e

    SHA1

    2607a7f43aff1074e9a87921ce842c2c790ffa2f

    SHA256

    5403a281e4a29449a9e0559104cb4133a2ae62c2b53550b8842e8dfe08dbd58e

    SHA512

    2b044719f78bf7dc4b61aeb1249d2e27dd292caee6447d8e74a8695510fa7529935b9cb9bad2097c72d0b04515571a0ca03aabc0b8b84ccdbc59db582a167210

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    230B

    MD5

    c1bbe5046657be9a51633e08eb4e012e

    SHA1

    247f3279ad4840ccc23523f10355d529e851475a

    SHA256

    1c7b95d65be103607e3a33b4d833e10ccd50d9124a41559cc122a4d1529315b7

    SHA512

    ab6e45c84a5fdb84aee46af630b9cf8311a514bb6e01eca2786400c848d925400f4d7e3b17795b650d81323377d85bb3a50d264349a718f8b41c7e24b655a46d

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    54B

    MD5

    d62c3b9acd7b2cd038b126ac0b15b7cf

    SHA1

    23ad55435a612b6b52794cc015697024e59dd1b6

    SHA256

    3fd3bc1330080543615dd31df5fb27bc346a6a83b1a0594d0b1b2a3714da8cc1

    SHA512

    f52065cde7727be6a1a3a7aa38fd54670d519363f81ac6a23acb0e4f3dfa8a01ccfccb3a5cf71e7ef432a0786f4a1c0bfcc5a4212977267e96a7d5fd78ef3113

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    63B

    MD5

    9bbce5e44c28dcfa72d628f1b8dcc030

    SHA1

    8cf51a0f3d36b9c28baa897ee7e50b185644d079

    SHA256

    127a2efd38cfbaee95dd3ddbe68183b3d85510462268f24f6f5e72a5dedd9628

    SHA512

    d1decc0361cc196845b99a69c8554cfb4e4e9f735d30ebc3aa561d0a19e7d2a453475c8416a78773e670e46ab0fdac174ade9493cbac6757195f5027252ad81c

  • /data/user/0/homeworkout.homeworkouts.noequipment/app_split/FiGj.json

    Filesize

    450KB

    MD5

    140931cf5ec9f734aaa6a411154b3e95

    SHA1

    346ea44390ae8e3c486a384c494470ef904178c5

    SHA256

    e498c4c2ecdb6c9f2ba1ddae69e264659df3909d222f881bff44ce72a43505e0

    SHA512

    7552edd6b197351f54898b44fb7b89ab84c6004e8959a8b93925e5e4f27c454035af66ae9146f13f1ea31876e6716c3fa295ccc2af16aa0faed63736e72855f1

  • /data/user/0/homeworkout.homeworkouts.noequipment/app_split/FiGj.json

    Filesize

    450KB

    MD5

    c186e81d554e3718b88b544fe5e0ab41

    SHA1

    60bc93ba5f26b03f6dda1b45a373af9f0ff59ea7

    SHA256

    9fe9deda80a8fa54b59d75d7782cae2a0b4c89c0ad026f3ff223e04b79d1326f

    SHA512

    1cb0b2fd7517e11ee12b699b97b45ae947a0bfbcedb1be21882680419199ffdc76381a1676abfb0df62ae45d21b607b1ea7356d81da4596e6ab09e6d78ffcd73