Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    28/03/2025, 22:04

General

  • Target

    d1c0cdb10470f8673294cc801a68d5215af68574f8bdfb74b7f67644498c9867.apk

  • Size

    3.9MB

  • MD5

    69abf4151dff74a4be06d8dc50644e17

  • SHA1

    c9f8f6b391eff2355ab5acdf4f4a1dd119d4dd25

  • SHA256

    d1c0cdb10470f8673294cc801a68d5215af68574f8bdfb74b7f67644498c9867

  • SHA512

    82975eafac59cd8673558d569d9c47fadfd1eb724a2511930aca8d97fc17cf4b683cdfaaaacadbd2824cbbdc423078515ef56b739614a81430f24579b3362c80

  • SSDEEP

    98304:f8ewdCkMC+ljoIo7gKH1UxEsCdz+VfwPCPfqACR0iegwDBy04YJ62VO:cCYYjC7gKVU+SfwPCHqArieL14Yu

Malware Config

Extracted

Family

octo

C2

https://hsfsssfafssfsks.shop/NzViZGU2MGI5MjY4/

https://hsfsssfafsks.shop/NzViZGU2MGI5MjY4/

https://hsafafsks.shop/NzViZGU2MGI5MjY4/

https://hsafsfafsks.shop/NzViZGU2MGI5MjY4/

https://hsafas.shop/NzViZGU2MGI5MjY4/

rc4.plain

Extracted

Family

octo

C2

https://hsfsssfafssfsks.shop/NzViZGU2MGI5MjY4/

https://hsfsssfafsks.shop/NzViZGU2MGI5MjY4/

https://hsafafsks.shop/NzViZGU2MGI5MjY4/

https://hsafsfafsks.shop/NzViZGU2MGI5MjY4/

https://hsafas.shop/NzViZGU2MGI5MjY4/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.placemayp
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4415
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.placemayp/app_trust/EL.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.placemayp/app_trust/oat/x86/EL.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4442

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.placemayp/.qcom.placemayp

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.placemayp/app_trust/EL.json

    Filesize

    1.0MB

    MD5

    c9eed6530eafe3956353bb31ff5aeb6a

    SHA1

    e10d12164a0274afdec0364dd92ec1d331aa1b55

    SHA256

    6816856a007bc0e4bfcf96f1e60507ef27891670e38fb806f8ea2eb8b0af64e0

    SHA512

    2df3624d27edd87dd26944d6e58a46befdb430537c3aeb098653536575227cfbcc18dcf86b1464557e94ca201658aeb92693183cd10a711374dcef506baaa99c

  • /data/data/com.placemayp/app_trust/EL.json

    Filesize

    1.0MB

    MD5

    608c7dfcc5c69a12ed4234895c8d05d2

    SHA1

    6bbfeaad3cb4711a433c800485e809d3451d4580

    SHA256

    15b878e2fe8483e8b70fcab0e5377561129a23f78d1d66d7f5c1b6646f6f0cc2

    SHA512

    be3b6fee19c638485cf06636477359085d9985731780c772b556ca004bd567e793fbfcfcf524a9dff5238bfa1143da97ca5e1d6ed9b3f509413e1c7d1b83739a

  • /data/data/com.placemayp/cache/jrcxdtqttqzvfm

    Filesize

    976KB

    MD5

    9f4cafc7d2f57a17a2e2da2f46318ebd

    SHA1

    500f78f00b7d008d2f10aaa1e815a4b6239d9273

    SHA256

    55190cdae9b9750953ad0bca3af89546a9554498aae873ef5de368c0e797d50b

    SHA512

    f86dc13420b68818927e9b8d0266899ea5323d44592071b0e0c0896b8e3139c2761e6aab8dd2a0cc4e6d6ce24e7e35eb07bb4651cf25541cac71ca63c64ef0e6

  • /data/data/com.placemayp/cache/oat/jrcxdtqttqzvfm.cur.prof

    Filesize

    492B

    MD5

    7a1bd63c5af1bc0385519133b3aa3665

    SHA1

    96566cff7ed9d089f7f6d150d3e80edacb6203f5

    SHA256

    44d44694fa2bd0363a943895ce5c4ef62bd597525ac42f3c7e58a09e8ae56dc2

    SHA512

    c99d9713e491b5806c94b6ad9f9e646a99b8fff56093d83b28092f16a563f73227eb6359d78ded9a4fc8b559b528e5f9c6b33435aca1959219a565f7cf4977f0

  • /data/data/com.placemayp/kl.txt

    Filesize

    230B

    MD5

    ac3ee3b4b449c1d3a625611e42062dcb

    SHA1

    869eb68a0d892b4d3d9b4cbb0703e962bc119248

    SHA256

    23ac117e6dfe2c7a9b7fe1e4c63f076bdf5952a6121dcace30d5ae803429ad8c

    SHA512

    f589b50b0a5bb3d0d33cb119ba91267284c64dab6cd03440b695638a1149c056991de879a549ab8dc91d6910ea110b10915e84ee90318f6dbfca587d4ce91031

  • /data/data/com.placemayp/kl.txt

    Filesize

    54B

    MD5

    a5c8cc8bec9f664d9ad3cdc81033f600

    SHA1

    35df8e837bc2031ffa5c45fcce3bfc50cee39fba

    SHA256

    e51e7c2339fada3150960bc63e04536e6770f023124da6105bfad067e7c30093

    SHA512

    7c996e623d206dc3a49da463c991a449a1f94e46665a3a7de26c7460a9c5cd728c24c2e09431b74d257b7d8dc806dbf0f1d861293a84e2c571a65dd2dc9b13f4

  • /data/data/com.placemayp/kl.txt

    Filesize

    63B

    MD5

    36e9d448a4345e8cccd72dbde9f2b080

    SHA1

    bd0e644e7381af5b6cfc04e26e9bfcef73ee2812

    SHA256

    79f23960dc4390c11dc907cfdfaebaecb46c5a73884ba1dd0641178d831b8ddc

    SHA512

    353c2d19563b4d0d7db90ab18cfcdfad423b41686c05c008afe81b06bd14a36d9a677c1da4a3f96c4696db30114d9f3547e58c866e8b2171d5eb0ba025e03c15

  • /data/data/com.placemayp/kl.txt

    Filesize

    45B

    MD5

    5f01a4bff2be90d467b88333b5e1df54

    SHA1

    a6c79f341a31ceb37c1009f15211a11a1f1baee3

    SHA256

    5df699d878d5077d72392f15d85cdb7d8d889f2b333864b0b33bbd729829955b

    SHA512

    d175abc2f724721a97944be9712044fb001a7c1477dc31d0b28cd64a91c7beedf64343c7698b4d564520325591dc03b3f0067ecd4b92123e92361e791c13c53e

  • /data/data/com.placemayp/kl.txt

    Filesize

    423B

    MD5

    f63c249b33699d75c025ef91929ab5aa

    SHA1

    dab55b0d809da819b7c62440225fc84672042c6b

    SHA256

    aae64f475ca193e6a7debc5a048d8571edc81e43e67b0aa91de9ed5ba229cbce

    SHA512

    60f9b6075797257b4580d0fcc592c23758caa07edbd67b11c73b5c8ca097ae22c112901714619e2cde56854ea2a17a4886f3ece1646a476420a28bfc5e712733

  • /data/user/0/com.placemayp/app_trust/EL.json

    Filesize

    3.0MB

    MD5

    355aa13161ce03e4501955a086e910ac

    SHA1

    97fe76036da1a8827713b2e9513dd815edd62ec2

    SHA256

    3558fbd2baf2b09972ff7e0046b9177b1f243592bc77f6b2c62ada4dbe59e62b

    SHA512

    af7102ebc3b0297f84b11253950790f12cc41139154959348c6d6ba4af9f2cbc8620780317f79aae890eadfdac5c3590b22e231649312a433b0a8584d1c2f1e1

  • /data/user/0/com.placemayp/app_trust/EL.json

    Filesize

    3.0MB

    MD5

    e0bac4170552f9c6d47ec62b1370b02f

    SHA1

    83609e1e152edaa357b3d3e6018f1b8b7900d70b

    SHA256

    554d30739b24153cb14f577a011cd36994136246fab639a566a41fd8d38e6db4

    SHA512

    a074058859d2e913ec3ec695c2d4caffd1da36c225c6fa2c7ce3f1b86d5cf120166ce4b786b2144b8b29a0b9e24cfe58376b4bd099e7998f704fbaff11b83d72