Analysis

  • max time kernel
    37s
  • max time network
    143s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    21-01-2025 22:00

General

  • Target

    ae54bd55db5dd84eacfe4596453fb469b21ccbac7486816dac0be64adf370605.apk

  • Size

    2.0MB

  • MD5

    cc0e4758281be3778f60898e091522c0

  • SHA1

    5b2d4c33c63ee5f96c630dcdc53602de7ef9073b

  • SHA256

    ae54bd55db5dd84eacfe4596453fb469b21ccbac7486816dac0be64adf370605

  • SHA512

    95aaf92045571ee346d8e657258385a30af736e00219fa59eb1748e207056922c92ae6ed43115485e868dae65e908e6c44a2d9097c0014dc94641de5aeec41b0

  • SSDEEP

    49152:JffweaXoCW8JaZUqUQ41nsNaIemjNotXqsCZGyWDwIVa55yDGZ08k:g4CB0JUQqsYIQXUTWDVK5+GZm

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • homeworkout.homeworkouts.noequipment
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4265
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/homeworkout.homeworkouts.noequipment/app_sustain/AdK.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/homeworkout.homeworkouts.noequipment/app_sustain/oat/x86/AdK.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4291

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/homeworkout.homeworkouts.noequipment/app_sustain/AdK.json

    Filesize

    153KB

    MD5

    2e5de05006130cb1202800205fbfc23f

    SHA1

    bbda04f60e69c06f40e91c95e32e535f7455a606

    SHA256

    d242d0867204367539aa0d3f3c98eb0c5ec67cdd5380f22ff6a733c963b86790

    SHA512

    fba662f222ac08953cfce5c018b7da8ef26936e83cd99763c452f07f78792cec654fc904307fee1b389dc1a4b138116837f8bc70084c517b8c027aab28e30c47

  • /data/data/homeworkout.homeworkouts.noequipment/app_sustain/AdK.json

    Filesize

    153KB

    MD5

    152581d53c976b1370e066f935a6e93b

    SHA1

    32fde6826991b3312fca64bdaa2264f0e5fd6067

    SHA256

    832111f3c03b57c86f192359cc2578eea231db205a40127842ae460c92f581d8

    SHA512

    7af75cdef6ee63a9f79e4c80a311b876d798575518e77e52ceeb7a83d24f49d961460908b7b0495ce36517d031c9763dc6d4d04a2c1b90384a0af49365d06741

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    79B

    MD5

    a0574de5979b756c6f07c14f97d64295

    SHA1

    452e7d706a3f61cc4667901fa21832e28d0e3316

    SHA256

    10fd67da34c64b99889246057d7335a8a7dab94f585fc109558084140a619974

    SHA512

    5341df95871c9219901f40b966707f462dbf7a610b049936143c442441fa163ca08245ef44b0835971cb52f364c3e167b1e0b3cd2ffacc6f0e867b8b81f358de

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    423B

    MD5

    52c4afa57170af540560a6243d6cf062

    SHA1

    81c23d6b81c6ebaab231d5e427f618544737c8c6

    SHA256

    ea9a1148030b3d7034deccc2dd4b579af4b9a54cf9defbd929707a36815898c6

    SHA512

    83824bf6367db9686481852b94d2cc95c3629a14ed629624d7a3fca28c491c116b19ac9d86e988e958874da2307bf4cc0d5ba38a3b73b70320a7293725ff890f

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    230B

    MD5

    c1bbe5046657be9a51633e08eb4e012e

    SHA1

    247f3279ad4840ccc23523f10355d529e851475a

    SHA256

    1c7b95d65be103607e3a33b4d833e10ccd50d9124a41559cc122a4d1529315b7

    SHA512

    ab6e45c84a5fdb84aee46af630b9cf8311a514bb6e01eca2786400c848d925400f4d7e3b17795b650d81323377d85bb3a50d264349a718f8b41c7e24b655a46d

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    54B

    MD5

    d62c3b9acd7b2cd038b126ac0b15b7cf

    SHA1

    23ad55435a612b6b52794cc015697024e59dd1b6

    SHA256

    3fd3bc1330080543615dd31df5fb27bc346a6a83b1a0594d0b1b2a3714da8cc1

    SHA512

    f52065cde7727be6a1a3a7aa38fd54670d519363f81ac6a23acb0e4f3dfa8a01ccfccb3a5cf71e7ef432a0786f4a1c0bfcc5a4212977267e96a7d5fd78ef3113

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    63B

    MD5

    05e2ff7c56f03ed800b67f562a64eeeb

    SHA1

    bc4e5d7a01fca9989267c621900f8a61736af6ba

    SHA256

    c98e4d0d9d398070cbf3b0155a53deb255dba54ba7b806e82a46b5ea363fa88a

    SHA512

    b456fd33f55839ba9d2fa234442deb37b7e99bea43f46f202df88945476ea3ecd0fea4527cf3072f0bfacf9b82c8b516e717360a0723ab382352d0d3514144e0

  • /data/user/0/homeworkout.homeworkouts.noequipment/app_sustain/AdK.json

    Filesize

    450KB

    MD5

    140931cf5ec9f734aaa6a411154b3e95

    SHA1

    346ea44390ae8e3c486a384c494470ef904178c5

    SHA256

    e498c4c2ecdb6c9f2ba1ddae69e264659df3909d222f881bff44ce72a43505e0

    SHA512

    7552edd6b197351f54898b44fb7b89ab84c6004e8959a8b93925e5e4f27c454035af66ae9146f13f1ea31876e6716c3fa295ccc2af16aa0faed63736e72855f1

  • /data/user/0/homeworkout.homeworkouts.noequipment/app_sustain/AdK.json

    Filesize

    450KB

    MD5

    c186e81d554e3718b88b544fe5e0ab41

    SHA1

    60bc93ba5f26b03f6dda1b45a373af9f0ff59ea7

    SHA256

    9fe9deda80a8fa54b59d75d7782cae2a0b4c89c0ad026f3ff223e04b79d1326f

    SHA512

    1cb0b2fd7517e11ee12b699b97b45ae947a0bfbcedb1be21882680419199ffdc76381a1676abfb0df62ae45d21b607b1ea7356d81da4596e6ab09e6d78ffcd73