Analysis

  • max time kernel
    146s
  • max time network
    170s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    25/03/2025, 22:02

General

  • Target

    d82946f984a9de26ae6140cf1fc6161643c9d38d1dad916e2d618cdeb81ea115.apk

  • Size

    2.8MB

  • MD5

    fbd83a088a8accf9ceafe2fc54dfbae7

  • SHA1

    0fc7ce4b8ca9ad50f323699a0959fad48ecae2d6

  • SHA256

    d82946f984a9de26ae6140cf1fc6161643c9d38d1dad916e2d618cdeb81ea115

  • SHA512

    962d5237167f59272ca66b8ff8e6e7223a81319f4da559c63b2c6513a8e571d84431ec158d48b881d53d7596107bd561e4c1a0258a523a35801887026b490854

  • SSDEEP

    49152:+tTxCE9kCxOc8/Jufka5ddFwRH0sIl0m5YbgW1Cm48Y4/FeAfybCmA0u1XbenFTQ:+tTxv5xOBJuh5ddF0I6sYcVA3/oP1gXd

Malware Config

Extracted

Family

octo

C2

https://mendenal.com/OGRmNmViNzM5ZGU2/

https://telefonkabi34.com/OGRmNmViNzM5ZGU2/

https://resmimendendal2.com/OGRmNmViNzM5ZGU2/

https://kingkongmendaet3.com/OGRmNmViNzM5ZGU2/

https://lui35anahtarlik.com/OGRmNmViNzM5ZGU2/

rc4.plain

Extracted

Family

octo

C2

https://mendenal.com/OGRmNmViNzM5ZGU2/

https://telefonkabi34.com/OGRmNmViNzM5ZGU2/

https://resmimendendal2.com/OGRmNmViNzM5ZGU2/

https://kingkongmendaet3.com/OGRmNmViNzM5ZGU2/

https://lui35anahtarlik.com/OGRmNmViNzM5ZGU2/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.whoearly7
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4340
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.whoearly7/app_power/KNpFW.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.whoearly7/app_power/oat/x86/KNpFW.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4367

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.whoearly7/.qcom.whoearly7

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.whoearly7/app_power/KNpFW.json

    Filesize

    1.0MB

    MD5

    78e5271860390e960fc1cdf5bc2b165e

    SHA1

    21d631144f7c8ef372b963b82c3d96cd6cee21f6

    SHA256

    f97b985f63065651f36ee9e5393bbf2dc36402797d6a19774c88102479b50ab9

    SHA512

    4aa1587b5478a0cee2398ec24bf3f980668611f2fe84c50b1a92aeec50d8966d93384254c2de061486737211f3711bcdddef52f63dc359250c66229b59de8b37

  • /data/data/com.whoearly7/app_power/KNpFW.json

    Filesize

    1.0MB

    MD5

    f4f24a847c2fcff70c97934eab4c5a14

    SHA1

    1ed19bd07aebaa1293be084fcd6f2aee26ff778e

    SHA256

    577f1c2e005d4473797b5d096e45aa9b356f7724621e0657eea49c187877365a

    SHA512

    66a8d5032bd9f9599af6d054229b342f5d94d8ad8c9df6d6adf7a4f093cf2512fdd46cb19786f51c307a97378f7567a518c4598274eb1456e7f56a71256401d4

  • /data/data/com.whoearly7/cache/cntbtunmfvm

    Filesize

    976KB

    MD5

    942e99d6a7fe958e4900a85f79f388b9

    SHA1

    9a5b4085dab3ed5752d57bd8c9f3c8439305c821

    SHA256

    8068105d52f6f55dac38c0f911a5b6d492b7bf0c902069d7e436ce177726bb59

    SHA512

    aadb9357b848e40f2d340ab1a088f25bc08a71c0c95ccead5c2bbaadc6931ff46dd17ced820ad77f3dcc525b7fccc416259c8a9f9dcf7e64566aaf93eca6ee63

  • /data/data/com.whoearly7/cache/oat/cntbtunmfvm.cur.prof

    Filesize

    362B

    MD5

    ddd6a19f54ed9d8876c73b80e4eff4bd

    SHA1

    c6a4f283e85507de4d061d6b5522164d299e9e86

    SHA256

    72c8f4e5d2d19c377ea3a78d80607234dfcadec7a182393ba0042ec87f4c455b

    SHA512

    8929e8696dacb6e2b57eedddf5a4cd1e4e3f5988c8424dc6dc66ea21dc52243b0f82478f974116290ead124cf975cbed9ffd15e3900d90677ea0368404e56b26

  • /data/data/com.whoearly7/kl.txt

    Filesize

    73B

    MD5

    341c99f521d3f45e9b031dc863779ea0

    SHA1

    2d7022473d311f3a27ff6dfa0d9d6612f1b6d03d

    SHA256

    ffa7be97279e5eb9a9f04e36e98629098796a4bfa080c387fc7cd2d5bf240e22

    SHA512

    363fbd02d568074e0d895074f4352f24e8f7588ea498a9f3a3e49e466354dfc406ed6ff3b8ac951d42c5e8b4e62a6f7cff667c9d0573c9efd4c8482e9cf64480

  • /data/data/com.whoearly7/kl.txt

    Filesize

    63B

    MD5

    4717e730972fe0634dd7bb8006843cc6

    SHA1

    f5b803b88e0dc7c18155325e14d50f485c2c3185

    SHA256

    b6cd087d9d9522f725cf1ba522fefb525c74c9de49a94acbe680a8d8e80e5fd8

    SHA512

    02feebbf51db553bd6b5b11f254854ea338d78cd14cfa2123b38055f097b74f066fca557eb97239f62dc5349979314c5ab23e8babd795123726b323bbab809dc

  • /data/data/com.whoearly7/kl.txt

    Filesize

    151B

    MD5

    55133c267204763375cc23db41ae1e8c

    SHA1

    35088589fc65b139999ab9e1b68eb4b1f224a5f9

    SHA256

    7f6560f9f088854ac6da79901b489daf14894faa793459ac33f545da6b58f0bb

    SHA512

    2e83aced113798637e45e292a451aa5029576aafe6b9d4ac9b2389858a86e3daf78d7f04db053b8aa5e05d28c558257ce3cd21294cb3e4acbe0a6156e60d05ec

  • /data/data/com.whoearly7/kl.txt

    Filesize

    67B

    MD5

    aa0c83fa13944f99c66b6ffb46baf9ff

    SHA1

    4f988e7e4efb9dfb1ccfa286c8943a7c276e596a

    SHA256

    0189ffa81ba80e316b66e652140ffb2892dccd18cfba0ce5ad251b44069e52f3

    SHA512

    61e4e9e9ba665fc6c70f7c17695996d0714ab1aaf391ae58b9296c1f555a094ce6dfdda901887cac4c9aad2fea96ffc028f01587d849304c4f3875a35c8e18ea

  • /data/data/com.whoearly7/kl.txt

    Filesize

    437B

    MD5

    2581e7a4d12813ce570e07392ce76379

    SHA1

    54d7f3bee151cc1552e69484a0d9ce8c2dc3f647

    SHA256

    5bb359461b282d3fd59a02c076398e0f89e2c970ef7b164ad5dc4bc58c7118e4

    SHA512

    1b7c54d311eb791b14bd07fa2ea0496ebee5e5a1a4f637104d78e410f316f7c421555f158d61b66f8915630100e7cf107d6c8fcc615ab0a91766be4b4bcc7377

  • /data/user/0/com.whoearly7/app_power/KNpFW.json

    Filesize

    3.0MB

    MD5

    fc4b60ddcecceffc6e7ece8c5efde427

    SHA1

    4f9e714eb5159cca7f9b8b1391998d56688d275e

    SHA256

    8f6bee66399bc9d93d8f556ee715cfc19db47ffceba97945304eb2b52ac6b618

    SHA512

    9c283b26151f28d78f0dff5d2eff3d6e95fda5e5b27e3bba79c059365739dc17c0af69ca4b5ec1416d61e144416fa3dabef7f35ccc12fd250ced3870f6e7f04f

  • /data/user/0/com.whoearly7/app_power/KNpFW.json

    Filesize

    3.0MB

    MD5

    46a2009530907cc4de3596261764cd6f

    SHA1

    2b9f5a1c50b16556d5a74e15acf249b4da4b126e

    SHA256

    b7c898a19df1ac35076629b90eddfabcc7572442d888cd74f124c416a82760d2

    SHA512

    5935c4b8ce1583f999c1fd4dded6ddb2114cba2b19db8ee41faf2b12be91f9e2c229be4c1e88c1a2bc0e8f718f57daa51a0288fdd91ddd9ba942e823dec717fc