Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    04/02/2025, 22:02

General

  • Target

    da907af8ed1db8066292e7d4908e00dbf633c805bb7d470c00452d8fa66a730b.apk

  • Size

    1.8MB

  • MD5

    1bb298f1c5885544523a42e9fae4b7b9

  • SHA1

    2259e707ca35500084d865ab4f547260f93e036c

  • SHA256

    da907af8ed1db8066292e7d4908e00dbf633c805bb7d470c00452d8fa66a730b

  • SHA512

    dbcfccdb2b080b11e97b0e55bc4df304c26d2c55c7ae264f54d4393e45479f9d17a3113ccaa00010494738c4c6015ca00aa7cfbd2eee129dcfa45c1ea27db236

  • SSDEEP

    49152:RG+39KGQLt3fajt/ZppcWIrF3GFgOkP1T5ztUnwGP6eYgFkbAita:RGKRQLtvah/ZMcmzJY6e1ebTs

Malware Config

Extracted

Family

octo

C2

https://kkcanertarihcesi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlhizmetleri.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlsistemleri.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlplatformlari.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlhaberportali.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlguncelveriler.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlteknolojidunyasi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlgelismeler.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlarsivkayitlari.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlprojelerplatformu.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlbilgipaylasimi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmliletisimagaci.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlanalizverileri.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlstratejiplani.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlsistemyonetimi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlvizyonrehberi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlgeleceksenaryosu.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlsosyalkullanimi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlonlinetoplum.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlodaklisisim.xyz/MzhiMTg0NTAwOTY5S/

rc4.plain

Extracted

Family

octo

C2

https://kkcanertarihcesi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlhizmetleri.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlsistemleri.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlplatformlari.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlhaberportali.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlguncelveriler.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlteknolojidunyasi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlgelismeler.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlarsivkayitlari.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlprojelerplatformu.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlbilgipaylasimi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmliletisimagaci.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlanalizverileri.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlstratejiplani.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlsistemyonetimi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlvizyonrehberi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlgeleceksenaryosu.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlsosyalkullanimi.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlonlinetoplum.xyz/MzhiMTg0NTAwOTY5S/

https://tutmlodaklisisim.xyz/MzhiMTg0NTAwOTY5S/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.inform.danger
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4338
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.inform.danger/app_inmate/ctHLNh.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.inform.danger/app_inmate/oat/x86/ctHLNh.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4365

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.inform.danger/.qcom.inform.danger

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.inform.danger/app_inmate/ctHLNh.json

    Filesize

    153KB

    MD5

    45644cdbe70bf76ea5cda8f9d340aac6

    SHA1

    e516b3db6b748eaf6d1c018d79769ed8b003c9f9

    SHA256

    1956f3468a2ba50367de3b85fbdcf6b0fe71ddfee9648bdc286f95a1c58408c6

    SHA512

    0e1327f490f65f77c433190ff4832b27ee536cb8e648637981f050371cf6cf633b90803612e7506dee5febb6cd584f0b1a8828c4e5e53e1d409ff8d7a4c4963b

  • /data/data/com.inform.danger/app_inmate/ctHLNh.json

    Filesize

    153KB

    MD5

    3a3dc3927ccc7d35381bf23fc4b3d2ed

    SHA1

    bca665b9f1b60e7fb45b11dee4cbac6ca1f27c3a

    SHA256

    e1071260d72c5e0e9b7a87717da7bafdb4c01562952e56c84ba08ea7da804547

    SHA512

    0b25205d7d3377a8e02fea55d8fe630bacf2efc5e3ea520ced5d360cec3546228e7d2b6442e72868c942c26b2163f8d6e3e6b1a9cfd67ac6ff4d2c47964eddc4

  • /data/data/com.inform.danger/kl.txt

    Filesize

    63B

    MD5

    e9e36d2b5e289af49475b9fc2fee61c4

    SHA1

    209a8e33ae403c38123d477508d1d5e039a3332c

    SHA256

    748db4399fbf6ca979ec72f03260aac7af6afd3f4e6c5b4f903bc3745bf228ed

    SHA512

    14fdc9782a3552b52eeb165fc776390c72c7745a1694ed4ca9f1ceec4d46548c14c6830f627ecccd200c545655e209ae80738c93dbff1cc5a00b3c87c3cefb9e

  • /data/data/com.inform.danger/kl.txt

    Filesize

    423B

    MD5

    e7d293ee4359b4bdd9a52707879d12b2

    SHA1

    04379c10fa73a6979b75b784dc96f610af889b42

    SHA256

    7197386a8816526b0d6f3aae94dabac41421d579e1bfa043614e8068e22175a5

    SHA512

    5392a59698cd26dea1fcf21b641d7ab8ed5cba7485fe8ff7c32a6a728a114f16748657c8d8acb51e0dd9f5916b89c30ce99beeb2b29519b7fdb4dd5063215c26

  • /data/data/com.inform.danger/kl.txt

    Filesize

    230B

    MD5

    e0755fcf9b9ae63447442781d0f17fd3

    SHA1

    f1ccfa14ce159e0c6bee6d883dec1d1521e551c9

    SHA256

    a74b42e0702c99e37659422298b4adaf738fd8c4d56ee55e38e946c711b5cc46

    SHA512

    f8908aacef23e837b664f427387f342497512bfdade23246aec38944740b160ad20d0c71d1df59c7529839eb4e8f6875c9547580d3374714753110d91194d697

  • /data/data/com.inform.danger/kl.txt

    Filesize

    54B

    MD5

    850fa76224a1b94371b9b72d7b4fd555

    SHA1

    bb5da5716c47a7b82c7abc211f66c795d5a09a05

    SHA256

    f085dd35272b0428c92e3c97e90cc29074c4600db3b9d3976deb70f78414abef

    SHA512

    a1c17abf470d0ef418b41a4e66adbc70f4290ca05e9de27e02d20164fcfa161cc0b7358ab8b87fbb002ff3a80b3a7e1c2ef4e8e1415204a3cac401ced3dc8d1e

  • /data/data/com.inform.danger/kl.txt

    Filesize

    68B

    MD5

    434b6f65a1a1f0ed5ab3984533e10ef4

    SHA1

    d257af986c235bb1fcf79b61b0affdbe9f89170a

    SHA256

    84d557364661cf68994bbe2431acb15b110416f32d18d8843a2a6437da7f2991

    SHA512

    a382520713ff5b79ad8a97e3261957aac6722e41f02de2bb628c2d1517ae3304974ac6940e503a773bfcf9537d3496cd46d57f1f915d41e126f5987627466315

  • /data/user/0/com.inform.danger/app_inmate/ctHLNh.json

    Filesize

    450KB

    MD5

    682a7beff87ef1dbf5bdf586e44c3f2d

    SHA1

    5d7f79d5ff91a92c46ce77c18342934b0bf20bf9

    SHA256

    e02ad3669126bacee406c7923f52f2af0494f2d4c9332e23afce5ca5bf83bfe5

    SHA512

    35e83ece91e7320f48fb0f585f5d4a5f3a266a4a72947194c7050d89ec49b509a7209c7bb567012790ff2cd2baccc216177250c3b66781cceb58ab89466ad898

  • /data/user/0/com.inform.danger/app_inmate/ctHLNh.json

    Filesize

    450KB

    MD5

    a37cdf4d3dc99237d0c2fc67e902a480

    SHA1

    25faa7fe90766bdd7e0b7a223181ecc2bda67b4a

    SHA256

    bc3b0fc913212fba7427fa74f0727134e671420455be08f19c74c6a0531afef5

    SHA512

    3619da937ada832f02d92eb71d9a1425f795e3f258182f74645de7b42489052da5cbeeee62d0f33dbea90e8149910cd1afbba69e05d6bf717eb6c6b26129cb6d