Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    21-01-2025 22:00

General

  • Target

    8007ac88e4a529b76295089f2c4dca672d029bec142051dde229d4e14ec7835d.apk

  • Size

    2.8MB

  • MD5

    e0e36096bcb65216da48c78f50c317fb

  • SHA1

    39c7cc6c4b7cde21afa4a85af44b91f24e444b65

  • SHA256

    8007ac88e4a529b76295089f2c4dca672d029bec142051dde229d4e14ec7835d

  • SHA512

    6354e558c3ed6cbdae7ad0b2e32036a76dbcaca841f18a785421f5bd98c14081dce2ad2c02373a966f39e67ef8da77bac1b026b89404e6589701bbe69c9db257

  • SSDEEP

    49152:49KZyhUyEoqdOraTXreGF5rQ9sLmyh3aKzz7rt8+1DHSXtRXwVj/bDlrlv3N8wiI:yK8hUyyYOveYhCsLdh3aKX7r2+NHCIj5

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • homeworkout.homeworkouts.noequipment
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4216
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/homeworkout.homeworkouts.noequipment/app_camera/XjlsEY.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/homeworkout.homeworkouts.noequipment/app_camera/oat/x86/XjlsEY.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4242

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/homeworkout.homeworkouts.noequipment/.qhomeworkout.homeworkouts.noequipment

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/homeworkout.homeworkouts.noequipment/app_camera/XjlsEY.json

    Filesize

    153KB

    MD5

    f12fbd685f9cdcf4c81ac5ff2f7c2110

    SHA1

    fddfcd366b7ea95f02d7b87eea844e9b3dacd762

    SHA256

    51f8ab02a1882a60224d486d247934e5d79e61c4422a7490e37000626dd36c2d

    SHA512

    cc4ce4cc47d42985530f5e5c57de60a31ddc58d4ca68e20930a0d89171d5db08a69fe8b64b58e2c86d128bc7b2545709aa30b5988c63d22928ed4aaa99b150eb

  • /data/data/homeworkout.homeworkouts.noequipment/app_camera/XjlsEY.json

    Filesize

    153KB

    MD5

    8a4ebbed69a1c469aa317cbbb96d05da

    SHA1

    46e15234d0e0571d52c6c1e224e711a2e888d292

    SHA256

    0009d72ac187a358b111b6a564b11c20da8eadd595c27323e5798f6bd93c43b4

    SHA512

    c95cb5bcd10213cb0dc6616df36806baa2f51366bba58f71fc2d0b138eea99bb1da4402e73a203136df7501064206175d12fad2f0e7a2bd6885d3a1d81c0d08a

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    45B

    MD5

    99bd5b782401f604d0265f5ddff53637

    SHA1

    f01e051eb99dc863607a7710980755e188bbd223

    SHA256

    c9a322e253ca109b46ad22df67a699c47666e54723620651c96ac3faa10b37e8

    SHA512

    4a37fde7e1102c83c2f4eabf67efe01e5898243642903c22b5b6a534b5dd51c218529714fa2ff4bb57e7804aa6d02e6490fa952d10b6f67b6923364efb48bff5

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    423B

    MD5

    733a678cb356fbef64bd1301beab0088

    SHA1

    90ec9bd0d6db10e4361052acb98a409c736d66eb

    SHA256

    be20e9edf0f77bdeb5fd4db38f3c207d31b2e51276957e40fe2ef8dee9721db8

    SHA512

    ab61af8559ad1ec2272e08d069b6f137f82ade46d83e42100b632c86d8f055a05854f00f55d728007455d20e104a4331bbcf22d640e28f94d53272fceab1c23a

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    230B

    MD5

    19c9ecd375b6e708a7243d5df3eec776

    SHA1

    3ab9d103edf41a0e2896525cebe2a7e23f6fdf3e

    SHA256

    452cca3cb18bcd7e909c3de2550f0f2b9aaa52a7b5e611823147917257a8e231

    SHA512

    6b1a8516efcec45e4e82e0ea6a7302fdbd385c896ecf3a670bf262178d54ab56df4109e11ecbf82a7d243d5544a222c2aedc4252ff9e442dbdbe1f468fb54912

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    79B

    MD5

    74cf89687c2dd4d0bff6bb83840acc2b

    SHA1

    20db7b8a7fd12193d8f78c380ff708b9d2765156

    SHA256

    77a73ca275a5b121af69b76609d46fc004e8612721a4f980be7e3e1e80186ed2

    SHA512

    160136d11cd0bf8cf0108ad6184da6f598f09dc170d24167e88bccb29d3399df2f512c3ea2fd9c77706a4a1ab8295e21da3e773e1af0dadaf5fed464eafd2cc4

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    63B

    MD5

    b69e19e00f870f1ddd82e479d32d6e49

    SHA1

    88a5704f1856238e7d1ed34eae363dfe712b1df8

    SHA256

    4a37bf49508e892a63e1ffa654332738aecf9e12d481057c2817d1f34e8b1037

    SHA512

    a6ea256850cd12ec1c5d28ce31fb9e8300608334947c4808cef97f4a40c450152199a9df47056676725b10e33f527e491bd4f5f4ea864f908058079dadb246ee

  • /data/user/0/homeworkout.homeworkouts.noequipment/app_camera/XjlsEY.json

    Filesize

    450KB

    MD5

    140931cf5ec9f734aaa6a411154b3e95

    SHA1

    346ea44390ae8e3c486a384c494470ef904178c5

    SHA256

    e498c4c2ecdb6c9f2ba1ddae69e264659df3909d222f881bff44ce72a43505e0

    SHA512

    7552edd6b197351f54898b44fb7b89ab84c6004e8959a8b93925e5e4f27c454035af66ae9146f13f1ea31876e6716c3fa295ccc2af16aa0faed63736e72855f1

  • /data/user/0/homeworkout.homeworkouts.noequipment/app_camera/XjlsEY.json

    Filesize

    450KB

    MD5

    c186e81d554e3718b88b544fe5e0ab41

    SHA1

    60bc93ba5f26b03f6dda1b45a373af9f0ff59ea7

    SHA256

    9fe9deda80a8fa54b59d75d7782cae2a0b4c89c0ad026f3ff223e04b79d1326f

    SHA512

    1cb0b2fd7517e11ee12b699b97b45ae947a0bfbcedb1be21882680419199ffdc76381a1676abfb0df62ae45d21b607b1ea7356d81da4596e6ab09e6d78ffcd73