Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    04/02/2025, 22:00

General

  • Target

    f44f19d4f4f4545b8851e443d6f86ffff3ab894eba0967b2839d7d01fc438728.apk

  • Size

    3.2MB

  • MD5

    1b6c5925746b271d58099a10ee0285fa

  • SHA1

    7b88e6d58c13b1a52a07565f4c7b5c482088948f

  • SHA256

    f44f19d4f4f4545b8851e443d6f86ffff3ab894eba0967b2839d7d01fc438728

  • SHA512

    fe04296e929274b305ba6f0285f592d5ca50b11e569634121b631e058e8ff205a85ba44034d46b00f1f67d6d510f9d2d868ebf6734061882375beb22b11a1bed

  • SSDEEP

    98304:ddGg4PIr10XFZ5hjtAAXagCR6NTNUILuY+v5pzm:/GgZ2BNCgTqIr+u

Malware Config

Extracted

Family

octo

C2

https://otomatikbahcesulamasistemi.xyz/fHTKmZhmwRmq/

https://tarimsalverimsulamayontemi.xyz/fHTKmZhmwRmq/

https://damlamasulamateknolojileri.xyz/fHTKmZhmwRmq/

https://akillitarimsulamasistemleri.xyz/fHTKmZhmwRmq/

https://modernciftliksulamayontemi.xyz/fHTKmZhmwRmq/

https://verimlisulamataktikveyontem.xyz/fHTKmZhmwRmq/

https://tarlaotomatiksulamasistemleri.xyz/fHTKmZhmwRmq/

https://bahceveseraotomasyonsulama.xyz/fHTKmZhmwRmq/

https://sudepolamaveverimsulama.xyz/fHTKmZhmwRmq/

https://bitkisulamastratejiler.xyz/fHTKmZhmwRmq/

https://sebzesulamasistemcozumleri.xyz/fHTKmZhmwRmq/

https://akillibahcesulamauretimi.xyz/fHTKmZhmwRmq/

https://gelenekseltarimsulamamodeli.xyz/fHTKmZhmwRmq/

https://sulamaekipmanlariurunleri.xyz/fHTKmZhmwRmq/

https://akillidamlamaotomasyonsistemi.xyz/fHTKmZhmwRmq/

https://pratikverimlibitkisulama.xyz/fHTKmZhmwRmq/

https://topraksizserasulamasistemi.xyz/fHTKmZhmwRmq/

https://otomatiksektorelbitkisulama.xyz/fHTKmZhmwRmq/

https://verimlitarlavemodernsulama.xyz/fHTKmZhmwRmq/

https://bitkisagliginagoresulama.xyz/fHTKmZhmwRmq/

rc4.plain

Extracted

Family

octo

C2

https://otomatikbahcesulamasistemi.xyz/fHTKmZhmwRmq/

https://tarimsalverimsulamayontemi.xyz/fHTKmZhmwRmq/

https://damlamasulamateknolojileri.xyz/fHTKmZhmwRmq/

https://akillitarimsulamasistemleri.xyz/fHTKmZhmwRmq/

https://modernciftliksulamayontemi.xyz/fHTKmZhmwRmq/

https://verimlisulamataktikveyontem.xyz/fHTKmZhmwRmq/

https://tarlaotomatiksulamasistemleri.xyz/fHTKmZhmwRmq/

https://bahceveseraotomasyonsulama.xyz/fHTKmZhmwRmq/

https://sudepolamaveverimsulama.xyz/fHTKmZhmwRmq/

https://bitkisulamastratejiler.xyz/fHTKmZhmwRmq/

https://sebzesulamasistemcozumleri.xyz/fHTKmZhmwRmq/

https://akillibahcesulamauretimi.xyz/fHTKmZhmwRmq/

https://gelenekseltarimsulamamodeli.xyz/fHTKmZhmwRmq/

https://sulamaekipmanlariurunleri.xyz/fHTKmZhmwRmq/

https://akillidamlamaotomasyonsistemi.xyz/fHTKmZhmwRmq/

https://pratikverimlibitkisulama.xyz/fHTKmZhmwRmq/

https://topraksizserasulamasistemi.xyz/fHTKmZhmwRmq/

https://otomatiksektorelbitkisulama.xyz/fHTKmZhmwRmq/

https://verimlitarlavemodernsulama.xyz/fHTKmZhmwRmq/

https://bitkisagliginagoresulama.xyz/fHTKmZhmwRmq/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.victory.ball
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4308
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.victory.ball/app_bar/tpIQ.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.victory.ball/app_bar/oat/x86/tpIQ.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4333

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.victory.ball/.qcom.victory.ball

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.victory.ball/app_bar/tpIQ.json

    Filesize

    153KB

    MD5

    0218ac8d5db66b39d2cc7c16448646d6

    SHA1

    7eb212b6c8a4a0e948d22e654c2bf930dc440ed5

    SHA256

    f54499208a665b2ab5b6770cf9e3d6bcf73cd2d85b780173ad5c2b50f6cd2fe2

    SHA512

    3a9752e976d4d1d03e200b931a90f6a54d53a32643dad87558869fecbdd091cb9cdbe4e30dae499fa2564914534dcb49d4c51365d71e58a1296672ff6fbf05d8

  • /data/data/com.victory.ball/app_bar/tpIQ.json

    Filesize

    153KB

    MD5

    189d066fdf913e1cca6ab995da2d2951

    SHA1

    2f8a9a8b352500f9434ab7e464015bd378676665

    SHA256

    a02b5510758225cd5761868272728412643e0b7683e5e427580ff730043289b4

    SHA512

    23b736c9942d996f5740ddab3f6189eaeb1db941c12a292034150653ebf1f5c59df6ce9f5f9afb1c6548fc63c7e74d730d0c57f8d36c347c01a1c72b0ee742d0

  • /data/data/com.victory.ball/kl.txt

    Filesize

    63B

    MD5

    d6820cf78f2f2fbed0239d6fb82f7bc1

    SHA1

    6f9dded5d6aa76ddb54b13c96d9e9b4c7a58ed99

    SHA256

    e1126a623fe6d6bac4f73cd6cc9820734cf31f1986573dcd03d0f92f1268d2b2

    SHA512

    5efcb783bb04ac026111f58a824797eef0560438cd85c02956e16228dc6dcbaf90c431bde248f57d45b5b725800a7ba844138c3c294b54880eb0a0b48b8d02c8

  • /data/data/com.victory.ball/kl.txt

    Filesize

    423B

    MD5

    8ea4233624f9fe65dba1dff34be16441

    SHA1

    e1cb9ac47bc712a56b8c57682a9bca6e63beff47

    SHA256

    1101214014bb3d217badc87f2571f94468801a3f747a1603325bd08e94340e06

    SHA512

    1ca47f65ca060c7a729579590730d3487b1aa5f74e36b42c7257111b8e1006df96f6d0c6fd21e2dac1d182128bdb13015e762a05a8ca96782972fd96e8d09e3e

  • /data/data/com.victory.ball/kl.txt

    Filesize

    230B

    MD5

    7343c4976610308f821f5e21211607f8

    SHA1

    9ea09a0ec814e36fe2569ced5d8c9ccbf6e1944d

    SHA256

    2b419d8156916ebeea3d33138b3c16b1aebdacec396d9a7690f494bde3b97e23

    SHA512

    b3e302c8274143ce82962d7023555ec5b0fd9e226cd451bf63fe99f37c781fcc2c7b704e168287cbf63fd0642e1c8b3f48794665bdd2cba10b0743d38fc3dbf1

  • /data/data/com.victory.ball/kl.txt

    Filesize

    54B

    MD5

    5efc90b189bc6d04ccd18f55a968fbee

    SHA1

    526bb29384c8036c762d5fd80b7808dae476b641

    SHA256

    26f34919d1ae6a304534fa86d60fec1076b27f59c8592b8dc02362b5643ea145

    SHA512

    cd3654a0bc615639bf6612cb1f8b2b888ce7f3866cff97516b7260167ada840b844f192e2433d7e0f354aa9360bd812149d34ad3531a48cb5307d31a1cce272a

  • /data/data/com.victory.ball/kl.txt

    Filesize

    68B

    MD5

    7b78edb6ae1fcf52686518f49418c506

    SHA1

    40a499898c4911fc8f4994f02f8dd8a24790dfe3

    SHA256

    b82366e026dc9c977c71237f1299bacb737aa92a64f6a7b56ca8b907edcf11b0

    SHA512

    9e5fbd0baf121e039115230df8858708cec2ad89afbf8d51e8296e15048299f9da2033406f26b90e66f9eb54e99b5bc914e4f72ba7269d6b0c8c8c15e0db6c20

  • /data/user/0/com.victory.ball/app_bar/tpIQ.json

    Filesize

    450KB

    MD5

    2484ffbac7ff2b128803ad5c93a21348

    SHA1

    3ec63f3a72b3b77756560e800a51a223d9a1a33d

    SHA256

    5d78b498e17bfb281b1b8a8ddf64f3a165fef571492791553bed07eeb96e2156

    SHA512

    31f6d5d1f48bfd0602b48936730624dd91a1d2f580c6e7150bf9adcd132f607fca63a4595e7ea8f79ac9dadfc9a1ad4e63f7d746b5e09ffa4f34c6bd8a80077f

  • /data/user/0/com.victory.ball/app_bar/tpIQ.json

    Filesize

    450KB

    MD5

    30502d8285da45aafb8a97bbd17179b7

    SHA1

    b66f1e91cb04384d6297bf96da99e256815a5ce0

    SHA256

    b28e6d52a9e4451505d450873d23ad82abc91019f1fde70e0945d561f4ec9625

    SHA512

    24539ea39396be04d5657733300c8e4cd08340819fc57ae2ddf42296e22b3c977e0cca1894fb557ed4c3eb042248e3b0d9e25623a020c206128daa2ebde2505a