Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    27/03/2025, 22:16

General

  • Target

    794ea0bdea490a246f04c4be19693cefe1df6e525f3df37311a47b1904d30faf.apk

  • Size

    3.2MB

  • MD5

    3b62cd26baab74ddca8b787dccf60c76

  • SHA1

    e4c101eb7bc7d7b5a3319603a6d1f6f9b78b68bb

  • SHA256

    794ea0bdea490a246f04c4be19693cefe1df6e525f3df37311a47b1904d30faf

  • SHA512

    caac35c871d014ac5af44bfb50fc7c5b499acbba73cb033d5035f451a1b2263ea44096edf6bfff63eda0a3ff345457b1a28cb01ecb495a1b38abe09e865f4beb

  • SSDEEP

    49152:wpkqV2alYTC3ImJbky3i+IPqFxpNfhfXeJEFdpTs8rfl9KQTOWiQ/KidZH68fnac:wp52d+fZkyLs+dCmfq3Y0gw0pjMe

Malware Config

Extracted

Family

octo

C2

https://kirmiziadim.com/OGRmNmViNzM5ZGU2/

https://rednoticeice3.com/OGRmNmViNzM5ZGU2/

https://mavibalina522.com/OGRmNmViNzM5ZGU2/

https://siyahpanpanter2.com/OGRmNmViNzM5ZGU2/

https://kahverengiayii3.com/OGRmNmViNzM5ZGU2/

rc4.plain

Extracted

Family

octo

C2

https://kirmiziadim.com/OGRmNmViNzM5ZGU2/

https://rednoticeice3.com/OGRmNmViNzM5ZGU2/

https://mavibalina522.com/OGRmNmViNzM5ZGU2/

https://siyahpanpanter2.com/OGRmNmViNzM5ZGU2/

https://kahverengiayii3.com/OGRmNmViNzM5ZGU2/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.addlivem
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4502

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.addlivem/.qcom.addlivem

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.addlivem/app_object/WIra.json

    Filesize

    1.0MB

    MD5

    1f1dcc5ef9a06ac33a8e59d192305734

    SHA1

    cb0ba1465dff6d73d7a5bdd7d73aadafd5ed19ae

    SHA256

    4684af4a3671a91ef73ae942f42c9bcbfee517e5b8018deadabef1d40ce507bf

    SHA512

    d19552e8d9b8533f3ca12bd0b02a6928eea214583efb217f7693cd33c26470b275cbcb679c3937fac92084f34d367f64b16d0afda8b06224d8cb05632437eb97

  • /data/data/com.addlivem/app_object/WIra.json

    Filesize

    1.0MB

    MD5

    8144069cdc25d91ef8205e7c7114bee4

    SHA1

    30cabfbcb8927e529fcb01ad93ad22d2cfcc2860

    SHA256

    169baadc187b3816aac982a8847db2b023b7530e5ab5aa90be6193edbde38612

    SHA512

    9bc622f5abf0cecf50f024244d7539afd9705b1f840dbf453085c3ff099b11200c97aa60b79ffe62d5a732c950b5f1b24da961efc18e0841af39b57b5817fdc9

  • /data/data/com.addlivem/cache/oat/ynznrqadqcogkbc.cur.prof

    Filesize

    402B

    MD5

    1feeeab0bf6a5ff03fe77fd52fe0aef3

    SHA1

    29772279110e12cda12b02137777b29aa7719dcc

    SHA256

    613b385e1646e70aba5404dd8f6c11136cb97dfc31f68d53226f8e856cb42d69

    SHA512

    d3649fde2c104fe9b399dcb7e9dfff47352da835d3f299bf18ce35c470f602968e0364b3849e481cab331dd8c02925e58d209a46c2db44d8ec6c99feffcfbfec

  • /data/data/com.addlivem/cache/ynznrqadqcogkbc

    Filesize

    976KB

    MD5

    0a94a00358002f5f20e1ad5eaeac116e

    SHA1

    62f9dca49df534318bd2b372a2dc31c750d13226

    SHA256

    e8dec8b7334cd6641787879d7169d4e2dbf848e2243c1efd5255cba7eac6ce96

    SHA512

    db01af0449a18471d0cbc3512021f7768655fed24248a7ba092d6239e6e08adfa03d87c347d97cf57874187a401e0f2f2a66d8a3400dede8ec58540132640f37

  • /data/data/com.addlivem/kl.txt

    Filesize

    504B

    MD5

    95a159529bf08371d9b9273993a5710a

    SHA1

    18b32f4840d5371de0a1adab5093fd5224cecdf5

    SHA256

    e04488ad7cc7a1073462538be11f61d9a9d6c5d5ff34a5ae918efc5310700c0a

    SHA512

    388c95fb5a0d655cfca4c1cd63d4a30bad36bd89fe13e08431a6409e27ffcfcb39dbf0977e3e66d11f884e45cdf47ae25ed4e5357e4061e2eb00f12799fbc55d

  • /data/data/com.addlivem/kl.txt

    Filesize

    221B

    MD5

    06891a05b2568a964254b1e38e5db279

    SHA1

    fe3a6a0a15e7f20f96348108d11a526dfcd89400

    SHA256

    e2c90b9709afaa29fc28223e38115242632490706bf25ea4f883d78f70f0a43c

    SHA512

    1c626fe3b61a11c78515cbe0d1a55ba68b9234a89a20fe5d9e0044cb778243d6ef103a8326249e6c0476d95730259a0167b2be8d0bea87e8c6ab0038b0a1c8be

  • /data/data/com.addlivem/kl.txt

    Filesize

    54B

    MD5

    150238d3c0ee9debf7a274a896891df8

    SHA1

    c0ea2cf47d5fbb0886ddc02bebd3ca41558ce3a9

    SHA256

    8a8e68f2e5761288e9178b730641c4b87b6c2523450a9c8938c7546f79728991

    SHA512

    8020b227a985693c849a98550c4ed80086f5eb88551d9b57da63f59e23c376cc00d8265910a3adfabc6fcb853214868fea29a4c3a5b8bb10085d54002ad9d546

  • /data/data/com.addlivem/kl.txt

    Filesize

    68B

    MD5

    047394cabe70247cc25723abba544562

    SHA1

    d457d8f82636ae212d2cd1f93c5dd2b21112c997

    SHA256

    ffb5d2164270abb6a7f353b293a611498d3a50b9391bf5fdb0acfe45ee3579ac

    SHA512

    47a172ccdf848a3e92a65ed87204350b32d5303870ca05a76a015d4c8738abf51404536a3999123bd81ce089434c380c95fc2b48f23169c4c42dceff63465bbd

  • /data/data/com.addlivem/kl.txt

    Filesize

    52B

    MD5

    29df345b0997cc3031c48abc5e6a8d0f

    SHA1

    055ced7a85be27d6e5dd8c4017c1a16174ad8dbe

    SHA256

    e943a8b51e30f7a1e561f5856dd76e564e8caa5f00544a37a939b5c72249b468

    SHA512

    219b62dc1a6b5c58fde845a723f41da3387eaa607086fb918f8c1a3d095ee8f33e579a477f33e09be2ba490e73b46cc0fbedcdfed08035c87fa09007082a1312

  • /data/user/0/com.addlivem/app_object/WIra.json

    Filesize

    3.0MB

    MD5

    6f8d6377e6f854f20487d15eb1856afb

    SHA1

    2b84df8c1903b0e16ba0475916f4ea4314bef1a7

    SHA256

    0b5735387bdca2680f43edc511d9a453ede4598ad2fbec575aee61b703b0ffbb

    SHA512

    8ebc265a34a809893350354ab578da7c7b2bb997b91030845b6e638aec64fe059cdbdf085637086536880397d8150ec29fc84f215d24ea92209433e285e859d0