Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    21-01-2025 22:01

General

  • Target

    e72ae65ac3e6c324b621203ce81972b15b45d2034eab554a009516113e709122.apk

  • Size

    2.0MB

  • MD5

    8ef84c13c9a153d2c389f96d2f0a021c

  • SHA1

    2dcac6c7a08134be3547688138deb04a187efd64

  • SHA256

    e72ae65ac3e6c324b621203ce81972b15b45d2034eab554a009516113e709122

  • SHA512

    2289893a42ff6b1913f594a082ed6aab8748d1e9ae974d9ec2a5dbc75756d3d57263fc76b70e653d98e3f98cb6fadc92749920eb644fc92c7c72c6dfff07a3ba

  • SSDEEP

    49152:79xfwMpVO0+U9kfT8MYvLUJ6eK81qVO5j6LZwc1i1j5x+VC97G7KP8+cKYdGU1CV:xLVxUT8hvLs6eKDOEKc69x6C97G7A6fo

Malware Config

Extracted

Family

octo

C2

https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenyenifikir.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenkulturu.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenvizyon.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenplatform.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenyasam.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencengundem.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencentech.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencensanat.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenekonomi.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenyollar.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenhaber.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenbilgi.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencengelis.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenpaylas.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenkulture.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenbaris.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenkonferans.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencensistem.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenprojeler.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://hastanebilgimtarih.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenyenifikir.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenkulturu.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenvizyon.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenplatform.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenyasam.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencengundem.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencentech.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencensanat.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenekonomi.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenyollar.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenhaber.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenbilgi.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencengelis.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenpaylas.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenkulture.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenbaris.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenkonferans.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencensistem.xyz/MzhiMTg0NTAwOTY5/

https://yenisurencenprojeler.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.teschvi2sions.smarupts
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4328

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.teschvi2sions.smarupts/.qcom.teschvi2sions.smarupts

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.teschvi2sions.smarupts/app_buzz/FJ.json

    Filesize

    153KB

    MD5

    c1ce3602788ef20257ecb0bd6d7a492e

    SHA1

    af5a6c75632a005f46b4263a26626635eacbdc70

    SHA256

    58e65510a91309b22f24d92698ba51f64b0ed3756ed93b3e5540ebf3ed650c6a

    SHA512

    f27262147d6842db7ed8e9acb270e654ae2e4612a0ded8972c687feda7dfb712cb2f38ec8b3056a8e2c9d4ad173e3c56b335b7cfbbe6c671873aa1c25e61732e

  • /data/data/com.teschvi2sions.smarupts/app_buzz/FJ.json

    Filesize

    153KB

    MD5

    af14b5adbf51a21b76e45518df04eaa6

    SHA1

    ce395aa9112749fcbf88a286c7b5e39f49f5d483

    SHA256

    52ef37ff8a9beead2075520c76d9de9f458fe6633224dce36db34418323ab56a

    SHA512

    25b84cd85cce45efb1aa784d8da3f71817657e7810e653caa1205953974f2e76ecf4122485d5584663b7c0a755b126a608d975dd82c119a7db972484752dbe83

  • /data/data/com.teschvi2sions.smarupts/kl.txt

    Filesize

    79B

    MD5

    e1a81c999be366d387f8377a7f3627a7

    SHA1

    4bc2df5fc6495f04b6c0955cb14f6613379a25e9

    SHA256

    17142dc74460466b3db3bdb57d8b4233eee35fb8578fe1fff97e7408161af962

    SHA512

    e366b8cc1f37cecb5ffd806c36c2b038b0c93bf5d35f1b1e8aeb26ff98c9c53402432bf4d323fbd731487182dc6dcff58b8389168104580e4e6f2f7d057f87ec

  • /data/data/com.teschvi2sions.smarupts/kl.txt

    Filesize

    423B

    MD5

    91e15be50d6756d07e925047c07319d2

    SHA1

    1584e2f4643e3f6d1159d64e114adb3054ff9a39

    SHA256

    3b3b8a179ddef91d8c285ee89cdfae880c3ea296193864008f06c9e76b0ac3d6

    SHA512

    914d5133a30039a74577cfcbce407141685d7ac7e5eb1b92f99b839497c227df4ebd3fffd907d5248182c3bead63cff2602a0d48cecbd9d40c28778f32bebc34

  • /data/data/com.teschvi2sions.smarupts/kl.txt

    Filesize

    65B

    MD5

    a1acbb17d671bd97f68cb701c48241c9

    SHA1

    989479ca0c45c16c40de0400abaa73c2adf0b2af

    SHA256

    ec74912e6b0cedeb266f3a88793e6996cbff95dc8c77c255f88e2f530d80dccd

    SHA512

    d0fd9616afbf350a301086a92702999d2787426d59859d895efd552e95f14476257a1eb74c17488551c64ad71726b138087ca1eb2f53cc716a99d1fa6cbf0b3d

  • /data/data/com.teschvi2sions.smarupts/kl.txt

    Filesize

    230B

    MD5

    adb87e142ec1b605e1b9b8eddaee8200

    SHA1

    301e6afe79d498d020353c1353fb63cd31c5c9f6

    SHA256

    34f12f32df7ede8e562a1f3052d48b403d1c31689dae46eaecbfe32944e33981

    SHA512

    39eed17ee822f936f2c0de81eb2e9c8f46857964e303afa172391badf94b1982891de6ffd888c26a7978174ce2d34ad9619ebee1b2e0e111d7a31d4fd3e8f491

  • /data/data/com.teschvi2sions.smarupts/kl.txt

    Filesize

    54B

    MD5

    f17830cb77f148ba55ce3ee259ae361a

    SHA1

    d7016c228efc3d9fbf19a02599c9f69fb5a0fcae

    SHA256

    9dba4baf6494aeddc8e41a080be1d5b5ef91dcb5ee8a93aa1800204547d7658d

    SHA512

    4a9a6d959660b4b736c443599ae41a79b9227f772d973ca599aee8e5023d8397c7f81e7c4b4a995e780cae0ffcdc0ee29dca43d1562833bcf697318fa9dcc1b5

  • /data/user/0/com.teschvi2sions.smarupts/app_buzz/FJ.json

    Filesize

    450KB

    MD5

    e8465cf59f11c96e844305edb130e0ca

    SHA1

    0037b257f87181bc230e97b361f999ad6e045093

    SHA256

    15dde7b7e38f369bcb8fcd28656d1bcafdbc845b7a39ea6f7d8030b19c9c141a

    SHA512

    c3e405cfede5b1b70f31aaf3e61fad087996a4f6fcbb74cfe520f56746f89e24f662ad983150c8368cecc6a4ed27c68784ba526f74b9bc3783e0129e781b0786