Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    23-01-2025 22:02

General

  • Target

    a5b9af38d443f27f41d955e0fb10776523b5aff492f9b23440cfa80893e64c7d.apk

  • Size

    2.1MB

  • MD5

    90bdde7fe5d078a775d55fc1d9f1f1d3

  • SHA1

    8e2f2324b3e10bd98e6de0402e2b3f0cbe6e41a0

  • SHA256

    a5b9af38d443f27f41d955e0fb10776523b5aff492f9b23440cfa80893e64c7d

  • SHA512

    a72876fd1ee5710576cb65dc9e0aff5fbd42fb8dba9889a47d0b8a6a318257565e3b5ceb78526839dc36b4e0b5b124714fdf03864a935768334e529f2d562d19

  • SSDEEP

    49152:r/RtVfO4ZL1t9mstViWzyTZjNFFjuETTxs4Ew95nutHgUHY20HSaeEsHkRNF8e29:LRtVfPN1tI1htjNnuE/xsJu5nuhgwYFE

Malware Config

Extracted

Family

octo

C2

https://sudanhavalarbilgilendirme.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarmanzaralari.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarhikayeleri.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarvesanat.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarolaylar.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalargezisi.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarguzellik.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalaranilari.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarkonusu.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarfelsefesi.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarinrenkleri.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarintarihcesi.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarvegizem.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarveyasam.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarinduygular.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarplatform.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarveseruven.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarindogasi.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarinfaydalari.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalardunyaniz.xyz/MzhiMTg0NTAwOTY5/

rc4.plain

Extracted

Family

octo

C2

https://sudanhavalarbilgilendirme.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarmanzaralari.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarhikayeleri.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarvesanat.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarolaylar.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalargezisi.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarguzellik.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalaranilari.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarkonusu.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarfelsefesi.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarinrenkleri.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarintarihcesi.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarvegizem.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarveyasam.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarinduygular.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarplatform.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarveseruven.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarindogasi.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalarinfaydalari.xyz/MzhiMTg0NTAwOTY5/

https://sudanhavalardunyaniz.xyz/MzhiMTg0NTAwOTY5/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.develop.random
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4260
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.develop.random/app_hockey/xFPsD.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.develop.random/app_hockey/oat/x86/xFPsD.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4286

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.develop.random/.qcom.develop.random

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.develop.random/app_hockey/xFPsD.json

    Filesize

    153KB

    MD5

    51ffa47db61fd44cffda75b616a524bb

    SHA1

    685da842248000d62bde01ed12e6673a3bd5c77e

    SHA256

    37bf3b365dc344eed8b878b0c8c0bb0492c6b901ae555cff485289239dbe38f4

    SHA512

    66079ee2b7511628884c9d9f141b5f1aee10cf2ea373e8b923219245410036f546200b6003d4f48abeeaa7efb008f312e30540a111425aca57889a3e4fc04f48

  • /data/data/com.develop.random/app_hockey/xFPsD.json

    Filesize

    153KB

    MD5

    86e49d37a1f46120db2859ed85ff44da

    SHA1

    231a77ea779fec419769127432defe58596b8a00

    SHA256

    f0832ae0cf569a062ce1251d4336121f640e3760db895c4eca45ca1372f6684c

    SHA512

    c672cc40b924f1808e55ea536078a90d7c65179a468378960c80d7bc276853b0dd6a7e553bc253a8d5a15a490dab5d44e88c44262c2a562e0567c1a6ee49a7bb

  • /data/data/com.develop.random/kl.txt

    Filesize

    45B

    MD5

    96671e2b47636fcc4e1fab1b1879e1e8

    SHA1

    511937b923ff8196a7e36f277fd65247491a629e

    SHA256

    cec5b764c50f283763be6696181b53def584581e682901c1d3e868b6cfba83fd

    SHA512

    15fe7f4fb0a9a29b0872a5c4dfe1d6b1d1859705c7b5453b23bc93b5f66a9b7bc016c5b4f56d2f81a8644f3953354bb739242b1fa03867255ac8fc9127ebf4e7

  • /data/data/com.develop.random/kl.txt

    Filesize

    423B

    MD5

    58acf433c08625481d702d79b046a2c8

    SHA1

    061992566c4b27d3a484cccee6fa1caaa0c75cc2

    SHA256

    0661242b887e85b025e6c1974f3348eaeb6a8d779ef11dd3971bf15c2960f5a3

    SHA512

    7d0e86e214470695dd968eb59c92bb7dce703d2049696652c76d612c7d408948208ace834c4e0f93140495f0aa42e134b2cf9f7e1f173e478d1fcbe040e6e680

  • /data/data/com.develop.random/kl.txt

    Filesize

    230B

    MD5

    2f9b8ce91c24a68e114fde7a467fecc4

    SHA1

    3903e464949ccf98fa68c38a208d1450f114d6b3

    SHA256

    d59d0e774290aa88e708c0fb8dc75b313dc7c4860db0d52e0bb1ba8a3a61cfbc

    SHA512

    c9264fef3d68a5662ff4b72b889166e9629cc33f23dfd111a8c08669a22533b99d8be1ffd7090ea4da7239febe94f14142dd439cc643ada331ed4d158f6e120b

  • /data/data/com.develop.random/kl.txt

    Filesize

    54B

    MD5

    1722adc7cabd2e8b047f7a4a48fdc2b5

    SHA1

    83e1abe1ab6d00ab38a427b57621f26cb9695ed0

    SHA256

    8e3d10ec927c14f8b6772615edfab23bb689c2c6784d4940d7101f9bb5fef558

    SHA512

    9a77426acc2fc1aa073646b7de11135349f7295dbcaea19b547ccc493a4d93dd153775498abef286f8502a28825cccd0af74295ac2fe50d1257b1e0765e2ece1

  • /data/data/com.develop.random/kl.txt

    Filesize

    63B

    MD5

    326a049e7ee2c20c7c7ab99e40ee5f2a

    SHA1

    db1d2fdd4d7fc77876c4f8a4db9c346215151ca1

    SHA256

    90a192493b72f890fe773e9a368cfdd8b6bb3cb5b22848e61ac6ff22a570cddf

    SHA512

    0534f657d8dc9a3075f13672ba877657409d38f39c12670e7e2a84181c1aef7972e6ac9c2827a972ad3e187a184338b31307b449791bf3810e481e33aef3b8c9

  • /data/user/0/com.develop.random/app_hockey/xFPsD.json

    Filesize

    450KB

    MD5

    0fb517181b5cec0781c836de035c7fac

    SHA1

    e354d0f9e81ed47da70964de7c23fa4e20716040

    SHA256

    a3071c8abed83572fc73579179f4d8a5b80965f4ec57110dab71de298ef56dd4

    SHA512

    7576f2000de6854fc97cf4379bcdff4ba77bdee917b08c25a88b30c4134d8c9ed2c14e3f8665a0d2620d07e10cfd5492707dbd3a932453fed64a04eaf375687d

  • /data/user/0/com.develop.random/app_hockey/xFPsD.json

    Filesize

    450KB

    MD5

    2ec72063c245d4595384df16539ec04c

    SHA1

    cbcb68621e154725d44a28c73cc8a65772b67f68

    SHA256

    48d8a6fe3dc32855cd17be92bf13810ee7fc323313fbc0c0d6be8e69236a7a79

    SHA512

    165e7d94e108b5e3cb1d858ebf9ef96dce4a2a69f34161be4a52dfdec47a8042ab837ac9632594001ea47f32698b8341655ea01ba1b38f97ef53a0da3dcb8dd1