Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    28/03/2025, 22:01

General

  • Target

    5f50bdb496c8f752dd3be22406ee0cf44b948af38646a889d0a6740da55a778d.apk

  • Size

    2.8MB

  • MD5

    4cd9d950ce9592b7afc3b2336c4f9165

  • SHA1

    13ad2a0383440405ccf0c2e7b530f15b940af1e1

  • SHA256

    5f50bdb496c8f752dd3be22406ee0cf44b948af38646a889d0a6740da55a778d

  • SHA512

    1e6d438765515ea70cbf7f6db99966b22dac033cfb43ff05be4d23fb01d2e6faead91d54698ca33751d3305e1c1823ed2a01c5d98e970bce05621785766cee45

  • SSDEEP

    49152:qo0J1fhxdb87B8if7TeDrGLwnogyJBxNwIe7zoMCdbGdIHO6nhm7:q7HL6Gif7TeMAsx+Ie/onKWu6nw7

Malware Config

Extracted

Family

octo

C2

https://196.251.88.213/MjUwYmQ1NGEyZTIx/

rc4.plain

Extracted

Family

octo

C2

https://196.251.88.213/MjUwYmQ1NGEyZTIx/

https://196.251.88.213/mjuwymq1ngeyztix/ogq0nwe1nju5mjuyadm/MjUwYmQ1NGEyZTIx/

https://196.251.88.213:7117/gate/MjUwYmQ1NGEyZTIx/

https://196.251.88.213:80/builderxxxzzz/MjUwYmQ1NGEyZTIx/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.nameown12
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4309
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nameown12/app_mph_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.nameown12/app_mph_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4334

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nameown12/.qcom.nameown12

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.nameown12/app_mph_dex/classes.dex

    Filesize

    449KB

    MD5

    cdce02be7ed0faa739a423115896be0d

    SHA1

    74a0a39a900459dbed4be750c9ffdd9a50db9b56

    SHA256

    2c27da31b75f7701a60f4e9df007a05cce8eb2a306e60b280a9343c3d4cfe558

    SHA512

    9e7f8a8f186b3e36b013ae909837589379e3dea68e63509b7d401f7fa7d0e7a7a9de56bf7aa94365f9994d0fb43fe345903eb7dba388ba53272fbb1d2b017e3d

  • /data/data/com.nameown12/app_mph_dex/oat/classes.dex.cur.prof

    Filesize

    492B

    MD5

    d7256f44e3529c64e4de68c2d76d4639

    SHA1

    c509afa1c284dd3c939c18190580c9ec37455b7a

    SHA256

    634995f259ce1bdac4b2038ea8b8fb3c255c2049e823308b24ceb0ee68561ad9

    SHA512

    daf77f151c1b0048fd3b623ebb2b0b38596d6934f74f9db80f6ff78f0774c1eee5a7160b0282279699f8e19c27e2de549bf33036112541539ce13f687d98c43a

  • /data/data/com.nameown12/kl.txt

    Filesize

    63B

    MD5

    9a6db27b87ecded31fad1feddab77dd3

    SHA1

    09deaa68029a7ba786ab11e83fffb0796bca1a80

    SHA256

    44a7d7d922ccddfe3498a4a0d9c66da24c6ae0399d4e253a320d75ae4ca96f7d

    SHA512

    923df092ba6ceaaa1af96ee3a7c62aaad6ec9d7258e1dea6b5bf0fb4011e69ee0dc5a1040f5d84c431e406bbc15e94b6245c743105cbf44cd7a2dc73134a9f0e

  • /data/data/com.nameown12/kl.txt

    Filesize

    423B

    MD5

    44cba9b81610f8e1ae5dcae482110d0e

    SHA1

    31911b79de387984c6a282b263fed3d97cbcb1a8

    SHA256

    d87d5e8c15388e953d25f7fb7c52db82b3041608f4d636230ef0c9f6378e5058

    SHA512

    24a59031bfd06cbe1ad216705d0bf6b40a8ac52e65b02751787ec088c15cb903046536b421a2a546139114e2a46449241509111a29c059df4b37340ec37a78e7

  • /data/data/com.nameown12/kl.txt

    Filesize

    230B

    MD5

    3c944b61b78034916e6d3156af094ef3

    SHA1

    bc47ad6e28bf1e111a0a420b40ba935be7e2b771

    SHA256

    1e21757ff6f08853f663e72d924ce88582e6c97a40e2224a4a006dbc01f74ce7

    SHA512

    ad51794587c0ea1cd87dc4cc83e7f0cc7e38581e92ce1e32e624cd4db6a07f89359a322096f2b06fd674db7c2a687965f7233ff0e844ae7ee6134f131fea4560

  • /data/data/com.nameown12/kl.txt

    Filesize

    54B

    MD5

    d91f4f2e6452dd353abdbc42f33660c5

    SHA1

    54537099a49e45390787d08624d6891e524906e8

    SHA256

    a3e21c4c85221ebd762bf763ef5da3f8c02fa9cfb8a3dcc4eb3cea1e1234c9a4

    SHA512

    88fab1e6993b6d1569d80169668953e40bfb8fbd3cdbc962da7e31de7556536b0b331a11798d123314bb158f5f11fc8bcfd157c849634cfbe4ddf7590bbb410c

  • /data/data/com.nameown12/kl.txt

    Filesize

    68B

    MD5

    cb61d0ad21e4902ee8f8eecb87bbf2fa

    SHA1

    c7cad42fd249ea9c33cc2c88ce5fbd71b2a2bd6f

    SHA256

    86db0e0f4b70784d779898c2cb35e4e7801387735c82e90b1cdd51c5bb628554

    SHA512

    fb6151eeaf44ea8a2c8371f65fe38fa22c7e17c1d5c6672509f0a5f4639b01bcc9e2f4a5ed80052efa18bfa9806edd6d688ffeeaf8a2bba31997bdc73f34d5c3

  • /data/user/0/com.nameown12/app_mph_dex/classes.dex

    Filesize

    449KB

    MD5

    ea6f04b87e667f6d0615849827bbfcef

    SHA1

    c3a473819b5d6e3dd6bc89b6ea40a21a543bc753

    SHA256

    9fb8c8609755267c5192048218d0fb3205d8e387e7286898ca03614bf57306d8

    SHA512

    987e6a8de8e90f668ec872b05b2301bcc361e714cdfa3afd0a5317ef682029f70e7bc2c723f123ea1910b49fceb31e3387eba59c9cbb58d092dda15eb95766f0