Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    27/03/2025, 22:16

General

  • Target

    794ea0bdea490a246f04c4be19693cefe1df6e525f3df37311a47b1904d30faf.apk

  • Size

    3.2MB

  • MD5

    3b62cd26baab74ddca8b787dccf60c76

  • SHA1

    e4c101eb7bc7d7b5a3319603a6d1f6f9b78b68bb

  • SHA256

    794ea0bdea490a246f04c4be19693cefe1df6e525f3df37311a47b1904d30faf

  • SHA512

    caac35c871d014ac5af44bfb50fc7c5b499acbba73cb033d5035f451a1b2263ea44096edf6bfff63eda0a3ff345457b1a28cb01ecb495a1b38abe09e865f4beb

  • SSDEEP

    49152:wpkqV2alYTC3ImJbky3i+IPqFxpNfhfXeJEFdpTs8rfl9KQTOWiQ/KidZH68fnac:wp52d+fZkyLs+dCmfq3Y0gw0pjMe

Malware Config

Extracted

Family

octo

C2

https://kirmiziadim.com/OGRmNmViNzM5ZGU2/

https://rednoticeice3.com/OGRmNmViNzM5ZGU2/

https://mavibalina522.com/OGRmNmViNzM5ZGU2/

https://siyahpanpanter2.com/OGRmNmViNzM5ZGU2/

https://kahverengiayii3.com/OGRmNmViNzM5ZGU2/

rc4.plain

Extracted

Family

octo

C2

https://kirmiziadim.com/OGRmNmViNzM5ZGU2/

https://rednoticeice3.com/OGRmNmViNzM5ZGU2/

https://mavibalina522.com/OGRmNmViNzM5ZGU2/

https://siyahpanpanter2.com/OGRmNmViNzM5ZGU2/

https://kahverengiayii3.com/OGRmNmViNzM5ZGU2/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.addlivem
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4364
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.addlivem/app_object/WIra.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.addlivem/app_object/oat/x86/WIra.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4433

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.addlivem/.qcom.addlivem

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.addlivem/app_object/WIra.json

    Filesize

    1.0MB

    MD5

    1f1dcc5ef9a06ac33a8e59d192305734

    SHA1

    cb0ba1465dff6d73d7a5bdd7d73aadafd5ed19ae

    SHA256

    4684af4a3671a91ef73ae942f42c9bcbfee517e5b8018deadabef1d40ce507bf

    SHA512

    d19552e8d9b8533f3ca12bd0b02a6928eea214583efb217f7693cd33c26470b275cbcb679c3937fac92084f34d367f64b16d0afda8b06224d8cb05632437eb97

  • /data/data/com.addlivem/app_object/WIra.json

    Filesize

    1.0MB

    MD5

    8144069cdc25d91ef8205e7c7114bee4

    SHA1

    30cabfbcb8927e529fcb01ad93ad22d2cfcc2860

    SHA256

    169baadc187b3816aac982a8847db2b023b7530e5ab5aa90be6193edbde38612

    SHA512

    9bc622f5abf0cecf50f024244d7539afd9705b1f840dbf453085c3ff099b11200c97aa60b79ffe62d5a732c950b5f1b24da961efc18e0841af39b57b5817fdc9

  • /data/data/com.addlivem/cache/oat/ynznrqadqcogkbc.cur.prof

    Filesize

    489B

    MD5

    d6a5cc794704f676160752531ed1088d

    SHA1

    564d583268070269fd8f91d97f8f6e87eb7063d4

    SHA256

    4485e113e5447bb192ddec3cf886f6ef055f0daf98a663ddb643131cdfd4b358

    SHA512

    f020ec3c6070ca888fe288ec82094f8e77fbb56be2d6fb98e2437021fc0ab1e4a894765a0103acb303baaa333432b62ab9fc35633eb21f8d70bdcdfb317469e2

  • /data/data/com.addlivem/cache/ynznrqadqcogkbc

    Filesize

    976KB

    MD5

    0a94a00358002f5f20e1ad5eaeac116e

    SHA1

    62f9dca49df534318bd2b372a2dc31c750d13226

    SHA256

    e8dec8b7334cd6641787879d7169d4e2dbf848e2243c1efd5255cba7eac6ce96

    SHA512

    db01af0449a18471d0cbc3512021f7768655fed24248a7ba092d6239e6e08adfa03d87c347d97cf57874187a401e0f2f2a66d8a3400dede8ec58540132640f37

  • /data/data/com.addlivem/kl.txt

    Filesize

    63B

    MD5

    1951001ccd8bfeae8c386988054b0393

    SHA1

    3b97ec0af589a9387f160b47d7d59ea13f1cf418

    SHA256

    b4303e702ea87363ce95fbcdd3bf8e66f05c0652ea265251d8476e7d0bce32b3

    SHA512

    eccfa7e32a4178aaaeca2fd2587d1b19a98c1f60d6746d84ad005e25c7ce2b33b6cdbc9bdb29fb8ef13dabcd9d91d46e72db3fd3ae99ea4c3c0be62d57a0d03a

  • /data/data/com.addlivem/kl.txt

    Filesize

    79B

    MD5

    21e1e96e8212ed5bf0ca31886c8159e5

    SHA1

    8a98cd4e43b455689f40cdc990ccdb61cd2c8cfe

    SHA256

    bf690e642550eba2aec7caf92281a1486a6ce136a1255ffefc3813cd7022120f

    SHA512

    a4364f4f72212720520b94ff12827bf9d772723463f800e2f02a7fad445689aefb6622837ca21aebbcf57a80f55aa5ae25ee8e6c22a0a445b9968ea8ca372296

  • /data/data/com.addlivem/kl.txt

    Filesize

    151B

    MD5

    2712aa89c54a155d2641442019a6e6fb

    SHA1

    b3a7896949378efe372761e1bbc9004f4ace040b

    SHA256

    08070748599d9f47a4a3442300bcde469441c31f46d60b472d7faa87226d264e

    SHA512

    b60f3fce9805a407c6bf653974a95de3e8f23de430b9c5bad9094906fc39247c6672d1fc5550b5026dfdd940abaa0d30a80ef4d57a09f09e2f85cfe99175167d

  • /data/data/com.addlivem/kl.txt

    Filesize

    67B

    MD5

    f6757126060603648a53c7d9550ff212

    SHA1

    d806d80a9c83c6bb10dc18dfc9bc7145c20dea50

    SHA256

    015a498d7a76dba711f4119c34da2ac92381d9ee85440583db876de6df26e396

    SHA512

    ec5f3ee3af0c6dd07d64800ade00114779cbe046a6089eb3a0247e9c7617b8bef9ed804b076238352e8e6948cedf34121b397f99a0b7af95c13365ba2939bfa8

  • /data/data/com.addlivem/kl.txt

    Filesize

    437B

    MD5

    0b669f6331dea5469fe497f2651789d8

    SHA1

    efcb46edd51af718c3af2eccd3578d5b3d1d6d5e

    SHA256

    9048931d2bf3073aed473073e2d68378db21615e50f0aacb3693ede63ad2a045

    SHA512

    26a1dd86b8c94250450fe93e00d0e5cea8ae9b565e5410eb197b0ff74a0f72ab86bd3a2ecf7bbd3b5ba240490bb129707905f186cd9f7be258a2f91190805ea1

  • /data/user/0/com.addlivem/app_object/WIra.json

    Filesize

    3.0MB

    MD5

    de4a6a3ec4558c1bc057ae63b1ca6e4d

    SHA1

    6a71742aed17904bc0b0c25e9ff52050b42b5f18

    SHA256

    63f7fdc111c0e207bd162ce6c2efaf3fff824b695a5dd76d9e0091158ab14bdf

    SHA512

    d393c30e40b0c5ad62e76d9ef79400b6fbbd146363ed3aafdb5e44d5980f5b2b61f5adc9384cc0cad631a81c24f49db240d02d601fad9969ffd0a924dbd9cda5

  • /data/user/0/com.addlivem/app_object/WIra.json

    Filesize

    3.0MB

    MD5

    6f8d6377e6f854f20487d15eb1856afb

    SHA1

    2b84df8c1903b0e16ba0475916f4ea4314bef1a7

    SHA256

    0b5735387bdca2680f43edc511d9a453ede4598ad2fbec575aee61b703b0ffbb

    SHA512

    8ebc265a34a809893350354ab578da7c7b2bb997b91030845b6e638aec64fe059cdbdf085637086536880397d8150ec29fc84f215d24ea92209433e285e859d0