Analysis

  • max time kernel
    140s
  • max time network
    160s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    22-01-2025 22:01

General

  • Target

    9a584dffb52c04d2fcec29e4cca55dff5a990525b4133e324ff0c2b27b7a498b.apk

  • Size

    2.6MB

  • MD5

    5d307ad6a2e8762136ee94c0f159ae9d

  • SHA1

    9783abf1360f9f17840a8e8c8b9367d85f4285e1

  • SHA256

    9a584dffb52c04d2fcec29e4cca55dff5a990525b4133e324ff0c2b27b7a498b

  • SHA512

    e238ae73cabff0b8acbbddd48c16c7a6085371c766c3772ffe017005cbb0a8a556b9a15c437582c56d2e6fbd86f5724b3ba10438809af07e5ab08010ba10a54b

  • SSDEEP

    49152:IG/7YKFQ/BGLKD+DGc4lmzvTnLuOMJszChUUibHvnAoxjtyxKyZA7eih8a2xt7hQ:3nG8LKDGslmzvTn4o9ZyEh8a2xttiy9G

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.certain.expect
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4223
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.certain.expect/app_piece/IKhf.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.certain.expect/app_piece/oat/x86/IKhf.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4249

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.certain.expect/.qcom.certain.expect

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.certain.expect/app_piece/IKhf.json

    Filesize

    153KB

    MD5

    c7e91bad4d0c2d77b35d167ca9c12387

    SHA1

    9dfef42ac9d5075c2df5c8e8a70436e47e7a9338

    SHA256

    425b4dd38e440463897860738002b98af53d7020fb29cb7f90934396a62a9548

    SHA512

    ae52ac7ee458fd39bb3f6414874bbbbd05e8e26d40d81e25c83586e2c158a85805e5d43538295f6bcf8c2ff546fc9bfc235add2216fffa23fdce91af1de7f2d3

  • /data/data/com.certain.expect/app_piece/IKhf.json

    Filesize

    153KB

    MD5

    d4c8a00277ab04a92d705f265cb8bb6d

    SHA1

    0a668b3691d55a2edbd76dc3a884807058992699

    SHA256

    ee408c0abb8a851904559eabd9bdc9ee632cdd2fa37834e88819b74f0b15df45

    SHA512

    0159a688f00834802fa4feca825a789e1b23eed87b4e442c7896415315bec12ee780593f3814333680319289abf3101f25ccd02077ee79896448a50b328786d1

  • /data/data/com.certain.expect/kl.txt

    Filesize

    45B

    MD5

    aa589acc5fa2947cfc81daabd4b38118

    SHA1

    cdffaf3f57bd34ed8e994e21a2fcba7fd25dbdc4

    SHA256

    a5fbeeb441694e46f8527b6e5059cc319b73c2f1cf2875e4001874724f93cc1f

    SHA512

    137f604f8f5a91aabc570a4eae87e0510d5a4161db4bd5d38fe1ed774163b1d56da1d2e8a56573bc1ff7f49e3e74af75c04bc34443bfdf82fae3a9f41f4b6877

  • /data/data/com.certain.expect/kl.txt

    Filesize

    423B

    MD5

    32e177f448ed5f9deb900d40c788e47f

    SHA1

    d34b6032bf055f60c1fed017db3d4566fa3841fd

    SHA256

    8983d94c752118f492f0d9176e76fbe6d27700466bfd179097e43423d0d190cd

    SHA512

    3873a75799c03c49540e97cfea4cc44e8f6d9c096be3b427fa3b43116f4da125c94fd9e8b05125e9b4e9af27230851ad85c8b9bf51af663060b7b28191237fab

  • /data/data/com.certain.expect/kl.txt

    Filesize

    230B

    MD5

    08da296cd49ec8608e4fc37e25ab96a1

    SHA1

    49fb38a3a74ed135f2420a5fcfca1b48aeebe4f8

    SHA256

    2e20bf11de17ca25a9b7042339a8a28c8fbf2e333a8452eb32c6cfda28f8d651

    SHA512

    b516a17d154b44c680eb9ab6b8235f596bd4a19a31fe874c98afdedd2f52a7f24cbb9b6961392f141cb1aa8232d31f93044244c8f58bd2d4acadc7169fbc09ca

  • /data/data/com.certain.expect/kl.txt

    Filesize

    54B

    MD5

    398a1d28dd527ac8f28956eb57be8e00

    SHA1

    bbc0071c5ee6553dab430bff65077707fa264cb6

    SHA256

    36f1d49ce19b9b67dd5340519635150b9064de4631c1bfdd87f904990fb74c0d

    SHA512

    7839e58d2f80f6db5804f58280e8d3cabe711d18d4f69eb807ea263b7d7f70e51d5f39516da5235776809460eea62be3ea7fd89f4d58731238eb3260e790fa6b

  • /data/data/com.certain.expect/kl.txt

    Filesize

    63B

    MD5

    992b2d3bb421a23c3302a8fae31b4091

    SHA1

    af8d8ef483d5b27033837b9ff235feb423de8c54

    SHA256

    4fcc931fec45bf5b47e379f826ef5fa351fef54410871b5390f5d1e8a7e248eb

    SHA512

    3b43d34c72ff14c549ed543aa4d1e21297ed24764cdf139eea1ea9f3513f9ab054b2ee5d7a491d6b13761c82af0d153ec3a233fb60bc49ffa79852892deb4767

  • /data/user/0/com.certain.expect/app_piece/IKhf.json

    Filesize

    450KB

    MD5

    2831cccdf4d4725ba9f863d0b484c4e0

    SHA1

    bd34f77a35871217e6b91866e4cb82803a39c41b

    SHA256

    5bbc7b7c2ded629648715c607e7b266ac76e2825f632634092d67faa8e7c472c

    SHA512

    725415e64f7325c5ce021ac7b749823566c04e2d65f2f43f7c85b006d7f5d73ab43202d9deb10bfc7eb706657e4a71e56c489eaf0192230b162d658d961e1df4

  • /data/user/0/com.certain.expect/app_piece/IKhf.json

    Filesize

    450KB

    MD5

    0d49a3166aa757be3145d81b81e4c860

    SHA1

    3a0268e09095b62604d63cf60e563f6d09abf9e2

    SHA256

    952b677e0dbdeb96a0d74cde2010aece1e713a845872f959bdf698d544067399

    SHA512

    0af6d382dfa945b0a8a560e55c4c5cab394e80137cf6a4ad8242a38a228b8075cb93ec148fff05d36343f116259b1b8d0bd437cc9ef669656b9e1e563a9177f7