Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    23-01-2025 22:02

General

  • Target

    64690efccbf5fdc7d88d41e8fd68efc5e26588d99946e8238f99253e33b66cbf.apk

  • Size

    1.9MB

  • MD5

    9e435740ed58f58ad7542459cd4f2b97

  • SHA1

    34a6ee9a397db545bd9e032e786a2f019d42f758

  • SHA256

    64690efccbf5fdc7d88d41e8fd68efc5e26588d99946e8238f99253e33b66cbf

  • SHA512

    ec04ed19a83b0cb3886adaa2fcf3676fd9655cf0ba3d2b5cf458d10f9bfd4464710bca869161c542f85dac0846c20d2f5b7d86384c69297d4f4b2118ab15bebc

  • SSDEEP

    49152:iajP9QzNgrf3icM4Vn7ty63rdb7m2muLrkwMWpVxeNKelflB:njP9YW7Sb4VD3rdb7lkDYRellB

Malware Config

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

rc4.plain

Extracted

Family

octo

C2

https://karakterolipsbilgilendirme.xyz/hxDNtg7DB3tk/

https://karakterolipsdostlukhik.xyz/hxDNtg7DB3tk/

https://karakterolipssinemaevreni.xyz/hxDNtg7DB3tk/

https://karakterolipssanatvesahne.xyz/hxDNtg7DB3tk/

https://karakterolipskulturkonusu.xyz/hxDNtg7DB3tk/

https://karakterolipstarihiyolu.xyz/hxDNtg7DB3tk/

https://karakterolipsmasallar.xyz/hxDNtg7DB3tk/

https://karakterolipskonferansi.xyz/hxDNtg7DB3tk/

https://karakterolipsgezegenhik.xyz/hxDNtg7DB3tk/

https://karakterolipsdunyasi.xyz/hxDNtg7DB3tk/

https://karakterolipsshowsanat.xyz/hxDNtg7DB3tk/

https://karakterolipsicimsessiz.xyz/hxDNtg7DB3tk/

https://karakterolipsfelsefesi.xyz/hxDNtg7DB3tk/

https://karakterolipsyolculugu.xyz/hxDNtg7DB3tk/

https://karakterolipsrenkleri.xyz/hxDNtg7DB3tk/

https://karakterolipssunumlar.xyz/hxDNtg7DB3tk/

https://karakterolipsduygular.xyz/hxDNtg7DB3tk/

https://karakterolipsgizemleri.xyz/hxDNtg7DB3tk/

https://karakterolipskaynak.xyz/hxDNtg7DB3tk/

https://karakterolipsseruven.xyz/hxDNtg7DB3tk/

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.letter.slot
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4311
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.letter.slot/app_luxury/wyBIESy.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.letter.slot/app_luxury/oat/x86/wyBIESy.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4338

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.letter.slot/app_luxury/wyBIESy.json

    Filesize

    153KB

    MD5

    ae9f50ff9b2dca2929496f6b6ffce505

    SHA1

    748498467f10235839d16825bad70fc14306fe98

    SHA256

    1be5f1e2d5b0dd68be96c5406806652c0ef1fae6066de55060fdfdeb4e36014f

    SHA512

    8fc2964ed7fd3ec5d500bec5482649eea5388f63dde80201570fabdf535acdc24386f1c7a516449340bdcbef21338501faf538edd022bb97747697c838025225

  • /data/data/com.letter.slot/app_luxury/wyBIESy.json

    Filesize

    153KB

    MD5

    d636abaf5ad9438992527803d3416aee

    SHA1

    1c6f621b9d6b4483f1d3f20107872570030735aa

    SHA256

    0f2a2e6e0e4929051a27b46ad2f9895a1ccd7b492b24d847e5a48d9cd1717ce3

    SHA512

    c1b64ca5a1a2f48bb6d429129935ab9b8c5c94aa0dc0cd6e27466db63ba94fea7f21eb2a10cb144a7b02c1ab7a1a8c71e4ee941e3b039d57a04b9018a50995fb

  • /data/user/0/com.letter.slot/app_luxury/wyBIESy.json

    Filesize

    450KB

    MD5

    46de089e48a5cde2c6cc34c6dc4b87e4

    SHA1

    bc8aec75d0e5347bbb5a0d7459fb35106345327c

    SHA256

    9b6c00bc6bbdb27c7de1acc558924b32d1ac81c0d0199620313187a7d35478a8

    SHA512

    6c6cdbfa56c8b0827625d0d98737beaef7a92a916e9c6f63a9c0bf469867f358106eaa483a116a16c02f64c0102d5750a7333e8a408cbf65f21c477fd01eaf08

  • /data/user/0/com.letter.slot/app_luxury/wyBIESy.json

    Filesize

    450KB

    MD5

    92a051bd9c7949d99afae224de781d5b

    SHA1

    bc37b5f26b38219048ba48a44f789b591630b627

    SHA256

    12ee632399621b85a55332a6a307f26d7dda3b439fa4255d80a7f24327fed715

    SHA512

    62d49c54bae12c8a949f7af62c7afd7febd863dfcc0eae0c67a2337b6acd14b86ddbd45630d53f2ea84e13f4520479c8a3cb866683f12839c61dd84cdf03e79d