Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    21-01-2025 22:01

General

  • Target

    092dbd1a4cf25298ea8a47229276df24b6513e5a8c3a4360f67c0f672e954bd8.apk

  • Size

    2.1MB

  • MD5

    3cbbdb33f9e0fd28acf02a03fe479d66

  • SHA1

    05c917c135b15a46bb20bf032f876c625501121a

  • SHA256

    092dbd1a4cf25298ea8a47229276df24b6513e5a8c3a4360f67c0f672e954bd8

  • SHA512

    b121bcd58fa7010f04484689acad7e768a93711fc44887dc7b3c419a5a05953a76802a13d3a63049d93e65fee5c3faaada3a4b48e279eeda95a66ed9fa124cd3

  • SSDEEP

    49152:7qgy3GzLak6jhI6jLU6sr15DtcnxllNt+hzHRfscDpgGF0/D7hdxC5JVLFoSeI29:M3GG66nVsJcnjljizHRfscphFcnA5JVS

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • homeworkout.homeworkouts.noequipment
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4223

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/homeworkout.homeworkouts.noequipment/.qhomeworkout.homeworkouts.noequipment

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/homeworkout.homeworkouts.noequipment/app_spend/Wo.json

    Filesize

    153KB

    MD5

    c480acac07d5670044e8a7823f3aa1a4

    SHA1

    05f499f2192a859a32df90c18b50f86bf26a663a

    SHA256

    8a3d54220b3eeb888bbe2fddff82d4f6f0f507b290054dab5c2bdfd4398f2454

    SHA512

    a9fa3bf9ab33cbc2489e870f202d016b361142a0458af94a69fc89ec4c0c3b15cbbfc1d520628f18cd1fd296140ee96d3dc1a51aa8328ab6dee923308aea13d8

  • /data/data/homeworkout.homeworkouts.noequipment/app_spend/Wo.json

    Filesize

    153KB

    MD5

    b16fb02d302fbe9d3ab1b261dff91331

    SHA1

    bf28de71f5bc7a105821dc03559f1e7dcd9a1326

    SHA256

    2bac2e99e98f740434944f9e951c6a01eb2bf1289b5b14aeb9a3499cb0f1f623

    SHA512

    44b48f04b3fcf5af67230da383d84646864ce6e6aee845dad5c4d57cf2bc280326993cdfd421e15b0055c24ec6a124ab4d336419e2aaa56b1f41fe1601240940

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    45B

    MD5

    95b342b66af1a015398e529351e94688

    SHA1

    8600968f7217b31ee13697031493a2119ef47d8b

    SHA256

    703edbba996115ac32f6fe5f8ab40f8c05e5f971f8eaf571bc93ac50ee15bb39

    SHA512

    a5d82b532522f6d993985ba1b3b8dfba27b71486e60b2b4478c29b2e76203c0f4b386ba347298403fcaa37b96df3ef7296adee00c2db6dff0ecf9ef16fc96530

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    423B

    MD5

    2324a7bce744988690ee6fa1514cb60a

    SHA1

    ed30b2cff96fa3ebf961d2471b73bc52479cebd1

    SHA256

    02501666b0511260ba319ae43fc9d638e9bae4ab16bef1687825917d10e519d8

    SHA512

    bd41c9a4951bf1947cd5ddab2fd7740ce9946b302a481363082f099e319dfae82763337793223201e10aa46656a4e13d24282219268e7f16992cc19d7351746b

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    230B

    MD5

    70575af80656b3e3f2a03dd79648e357

    SHA1

    af1b7a43db7ed95c08c077685c544ee7e55df5cc

    SHA256

    0a0905cf54eac3d8435b558096ec44e2eb81bb625d90cdbf5db929a295ee3e9a

    SHA512

    0ed0e49e8c96281c4a3c00f6360454a138027eada2b1923cfd4614189827f7d4cadf342b96d74d0b3a5f70ef98a3045a886b2ac3d109464817bd08e49f0e7872

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    54B

    MD5

    315cd15e483c53f4d112c80b986987aa

    SHA1

    814af08e79d42eb66bf5315a45cfcc07626df46a

    SHA256

    07f0fe37e5109b6ae62b5b9780bbb182e2ad21b9e7cb7916b5cc36856a1fc650

    SHA512

    638b0f7e9524924d749719cc4e95f82a907a7077042fe63eb3a0d6d6749dd0af8d534ce79914ad7b8c686e0f1c0b6678f9c999de5fffb7c8ef5efd24b055b9bd

  • /data/data/homeworkout.homeworkouts.noequipment/kl.txt

    Filesize

    63B

    MD5

    26bc0258afcd9e12b5fd6504ffc318e4

    SHA1

    0fea4392fa00c866b08c1b90021a038754809036

    SHA256

    0e0ffdfcb3bd00b7727959a316338b088b1bf0cc5bc2a9b47896bdaa18f880f8

    SHA512

    1311a893e9eab72f2326809ab81422343cf43672f665f43a1bc85363a3e0bcf6badb7e97cad9e30aa5f5a479447a4928884a83efedfa4945376c84dd3bea6df5

  • /data/user/0/homeworkout.homeworkouts.noequipment/app_spend/Wo.json

    Filesize

    450KB

    MD5

    c186e81d554e3718b88b544fe5e0ab41

    SHA1

    60bc93ba5f26b03f6dda1b45a373af9f0ff59ea7

    SHA256

    9fe9deda80a8fa54b59d75d7782cae2a0b4c89c0ad026f3ff223e04b79d1326f

    SHA512

    1cb0b2fd7517e11ee12b699b97b45ae947a0bfbcedb1be21882680419199ffdc76381a1676abfb0df62ae45d21b607b1ea7356d81da4596e6ab09e6d78ffcd73