Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    28/03/2025, 22:02

General

  • Target

    97d49aa692188661703d81e9cec54316c70cb687ca7b7200d1cc7748f877dc9a.apk

  • Size

    3.4MB

  • MD5

    cacf9243b82997e019744611cf6e7773

  • SHA1

    ab7129538ac78a08f9c7b739682aaa7779329b83

  • SHA256

    97d49aa692188661703d81e9cec54316c70cb687ca7b7200d1cc7748f877dc9a

  • SHA512

    2fd7a24911ac830b903bbdfab48b19a13b729d5a786b8a817aab24f16d0fee13f96761bdf0a3463b18590fe6b45f5693d0419a14bc0b470bf155654a6d0ff1fb

  • SSDEEP

    49152:YV0pqrJswuqNKCvmG1Odkf9lkud02nSlqb8IOgyQe7d/8DEBbzxndwg/yjqN5Qb6:Npq1BvNK7RdknEerLW8SzDjUqXiY

Malware Config

Extracted

Family

octo

C2

https://kirmiziadim.com/OGRmNmViNzM5ZGU2/

https://rednoticeice3.com/OGRmNmViNzM5ZGU2/

https://mavibalina522.com/OGRmNmViNzM5ZGU2/

https://siyahpanpanter2.com/OGRmNmViNzM5ZGU2/

https://kahverengiayii3.com/OGRmNmViNzM5ZGU2/

rc4.plain

Extracted

Family

octo

C2

https://kirmiziadim.com/OGRmNmViNzM5ZGU2/

https://rednoticeice3.com/OGRmNmViNzM5ZGU2/

https://mavibalina522.com/OGRmNmViNzM5ZGU2/

https://siyahpanpanter2.com/OGRmNmViNzM5ZGU2/

https://kahverengiayii3.com/OGRmNmViNzM5ZGU2/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.holdfinalkpr
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4335
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.holdfinalkpr/app_kit/Kh.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.holdfinalkpr/app_kit/oat/x86/Kh.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4361

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.holdfinalkpr/.qcom.holdfinalkpr

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.holdfinalkpr/app_kit/Kh.json

    Filesize

    1.0MB

    MD5

    8b4dcd8d731dd3423acced1d7de17e93

    SHA1

    081ca7498718e1ebea959c7871ffe86cb5d656e3

    SHA256

    f63af437ce53fb932bbc8163c69edbaec18321be9be1d56e61f2166e2eda2607

    SHA512

    03a6d0db3afb19a83701f9e31d345d8857add3f242fe80c98dbb5304daf2df522cb917830593b6d7658a08f29717f0b4a0ce39693cb0c14a2e777d17a31406bd

  • /data/data/com.holdfinalkpr/app_kit/Kh.json

    Filesize

    1.0MB

    MD5

    febd017a32cb2bd3c5ed78edf29d6726

    SHA1

    bbdd37953b318505b4f114a30a5afc044d284c30

    SHA256

    28585a52f94aa1c64eddf3f4a9a924354c48ffb46243f87dde696b8abaca1b97

    SHA512

    2c901bae6ab62b80875bbfdf4f0b23ad3591d0ab7147d0d009d42363d71f562c1928c25f88d666dd0f520f93ca9c3579082adec930ee9e1168e27aeab9c8fde4

  • /data/data/com.holdfinalkpr/cache/acsnm

    Filesize

    976KB

    MD5

    ea7a496bdde8ae904ab2296574fd81cb

    SHA1

    646413181b37b3127bfa08b045d3d5bf2e230506

    SHA256

    3f6d549c8841a0d199371e0465745371993be16b80f1a975a7d7ac453053633e

    SHA512

    f496e2b20e3117123d0492d13df468f3966b521b0ba10edb79e9d5ec19f32fb4134f778c652b3fe970782fef1131d293f8752a5e9000defc403a6d30dcd8572c

  • /data/data/com.holdfinalkpr/cache/oat/acsnm.cur.prof

    Filesize

    493B

    MD5

    405eacd789a9175f97e2e84f64138625

    SHA1

    28589ea46d810777bbe8fea935504937eedfa709

    SHA256

    aa74b7535762fa4085ef18ed568fda8d1dc4df22ac39beb900700d645cf4a49f

    SHA512

    a32948421822856c81f6370c016467762fda7edd740845edb305970aeb6282b0d9e1d3c6df61355719c24fbb53462d900be0a1ac2845ea7c8087e0030d4a87bd

  • /data/data/com.holdfinalkpr/kl.txt

    Filesize

    63B

    MD5

    05ec1a83270a761e31bc0fb46beb673b

    SHA1

    12e660f82a0a4e4c2a0c99d0ec1d42d20936503f

    SHA256

    f8af2888d9d68ddcba1809a419c9074a3a2f166d5c57ed4cfc0eeca19df3df43

    SHA512

    7ec5868bfa9898cfff727cbef31f2177a3cbdc8fa1540509c1c4103af5710b5f5f6bc40ef1eb828af9c544d389ec2ff175a535c6bb676e25fcd7f2b2a028fc1e

  • /data/data/com.holdfinalkpr/kl.txt

    Filesize

    151B

    MD5

    1939352a5e765837d0e0ec74b9685f75

    SHA1

    4386d6fe465df24c0e879c78047f73ef8ebc800d

    SHA256

    e67226c503ffa9b977ce9bd3cf0b39d2bfaaea0814fb763b86dee76c071a3747

    SHA512

    faed6a735df9a7dac67e1ae6f643a7305d1014726f5c7a9f5997914c888658c49825b24f143c7cb48a25bdab9d7fcfda032ee43af14df2e9668b858c6d4a2cf6

  • /data/data/com.holdfinalkpr/kl.txt

    Filesize

    79B

    MD5

    508179d3bc87066e259be0cae4adf16b

    SHA1

    d4ec59ba972133faddb746ba67aa62f357686df3

    SHA256

    443389b864bb1d7fea0ce5220348f419b21abd9ed372ba2874f02b64d94d30a2

    SHA512

    c3340c7d5c54dfcc371f8d7028ca7c3710a274663ffc1877cbe9a1c728caba0e0625230e3487a0ee1a128b4d8b0ac508d87f34126fdc7fe71abc2d4c4b0b4d78

  • /data/data/com.holdfinalkpr/kl.txt

    Filesize

    67B

    MD5

    0ebf89e534b8c5d7b718ae98d57c3e3f

    SHA1

    80fd4dbb919e15b6f2de4d03dd431cd97e24d541

    SHA256

    6b394b4808995a391f6d275798e2d66fbd19edd46e42371555bf1317afe26f7b

    SHA512

    6775e8affce0a224066b2821e83200bb63b283ed362ee26acb66e176b3d0ff051559c78b28306cd7049c303fa2b001ab787e32292dd00a076ba903272a2e8a31

  • /data/data/com.holdfinalkpr/kl.txt

    Filesize

    437B

    MD5

    3075f085c053e8b8fd220cb67d784c23

    SHA1

    52b791a86626e8814f5b68eb023948c7a22c48ad

    SHA256

    f08b74f7e4e28f72493490b416e12e1999df432361e14c2e91322f121b64d5b9

    SHA512

    ff8e5f6b606bb71e11d8ca6c22e11d2e0ee813903c5e294f1b8424adc9d0de3909d946a911494cf9344c71d8040f7b00e4801b31ff140015e9a4c491e6ba1741

  • /data/user/0/com.holdfinalkpr/app_kit/Kh.json

    Filesize

    3.0MB

    MD5

    662fe608ddefbcdf78717b9c1fc5acd1

    SHA1

    1e3fb38161a1b194322298ce5ceac34d6799fba8

    SHA256

    487e2fc10f0fb706558cc46862b960c0c21c950456e300898ecd19ff89652e60

    SHA512

    004e486709aa7338678113eb0eb05cc8f47fd0903bfa1c4ce9c196a477683cc2e7b8bc0bf24fb1026fbcec5b9d36c8f7b9d9157c347d5e8ac91e64ea2a59da93

  • /data/user/0/com.holdfinalkpr/app_kit/Kh.json

    Filesize

    3.0MB

    MD5

    5b8657de2c679ae4ad18b2e8215f4427

    SHA1

    3064c1dc44d7723e8ec449234f980df0ed3feaf0

    SHA256

    a9cde6b87d2fb5cd7e7faa7a594bf38c72ee19750f6ccdca9adabc84436c6b3a

    SHA512

    4c317bc3a25c3cebacedacd420d32ac5f6514e7da4aa80a83242f920b2b4b0f44fd2ad4a5ebea6a137cda3085254c90dd46aa0547c3f35905a7fb27777f9da62