Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    08/04/2025, 22:18

General

  • Target

    3710c55b667618efeb7a3390993ff480a740fc73a38f6d6c7e1970cf38e325c2.apk

  • Size

    2.1MB

  • MD5

    73813967250bd6df19d65674445cd9db

  • SHA1

    27893d72526fcdb3a9802df896a79835777f7ff7

  • SHA256

    3710c55b667618efeb7a3390993ff480a740fc73a38f6d6c7e1970cf38e325c2

  • SHA512

    e7a86dd64040f6b220038dd47756644119edcf545ce9c1200ac450bf1cf659e31de9c7d60bc0b7ec9712ab95d7d3bbc226802b5f527d966e711e82c27611fcb7

  • SSDEEP

    49152:gPgVLVCLKjfy44UVzsbpbeYhvKStGcTgC8IOQ3eiWiXofbcwgQGJDx5eX:goFkLyft3YbpxlKShTgCAifXWjgPJvg

Malware Config

Extracted

Family

octo

C2

https://tonbaliilezzetustalari.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliitarifmutfagi.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliigelenekseltat.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliisaglikliyemek.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliidunyamutfağı.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiseverlerkulubu.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiustalarinyeri.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliigourmetlezzet.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliisoframizhazir.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliishowlezzetleri.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliitariflerdiyari.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiyasamkeyfi.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliifirintatlari.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliilokantalari.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiseverlerklubu.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiessiztatlar.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliitoplumlezzeti.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiuzmanmutfak.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliibaliklokantasi.xyz/MzhiMTg0NTAwOTY5S/

rc4.plain

Extracted

Family

octo

C2

https://tonbaliilezzetustalari.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliitarifmutfagi.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliigelenekseltat.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliisaglikliyemek.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliidunyamutfağı.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiseverlerkulubu.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiustalarinyeri.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliigourmetlezzet.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliisoframizhazir.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliishowlezzetleri.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliitariflerdiyari.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiyasamkeyfi.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliifirintatlari.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliilokantalari.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiseverlerklubu.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiessiztatlar.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliitoplumlezzeti.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliiuzmanmutfak.xyz/MzhiMTg0NTAwOTY5S/

https://tonbaliibaliklokantasi.xyz/MzhiMTg0NTAwOTY5S/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.sort.strategy
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4321

Network

MITRE ATT&CK Mobile v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.sort.strategy/.qcom.sort.strategy

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.sort.strategy/app_tortoise/ljNBiZW.json

    Filesize

    153KB

    MD5

    fe6e66fb592c9599ac0672cc9e632420

    SHA1

    bbb153d11ea5b3df7336d78fc26a0a9a0edb4ec6

    SHA256

    9179afd642e007833bab373f3f35d25ca9be8a55bb63b8410a247bdafa2493b4

    SHA512

    a7614a5779ed2b4124be3c7fe729088111d6e3c6507860e11324c247691e177a3c97758eb4c0c25236d4609a7691ae63637adb814cc6adc24ce557d2ad56a70c

  • /data/data/com.sort.strategy/app_tortoise/ljNBiZW.json

    Filesize

    153KB

    MD5

    41c3e87635c28fb2d33f9885b8025b19

    SHA1

    84dd4b7ce9ac33262a286118887dac8c1d37806e

    SHA256

    bf5165124f37cc5513f88552c559efcfd4e055d4d2eb777d4596d33ff466b4b3

    SHA512

    76f568c00e81c104ae646d2ce3222e97a3f8d75fd537483db3dfaf80a55c27c4e8a712d53312fb0957cc61dffaefb1c97b52f5f7100d220afa56c0d28ce22d76

  • /data/data/com.sort.strategy/kl.txt

    Filesize

    45B

    MD5

    19b383c77797f62ada4c21d2f2ee991c

    SHA1

    99d0e1a933130f081eb87e1a3cad3c7f66b8477a

    SHA256

    5aaafe07b67e093a8e5e76fdfe93e2412e8252bcee8b96afd74f1b64b138bdbb

    SHA512

    7d8cd81f22e4c4e2ed8e0b9179b046f0b3440489292d7ebc381f43263b6ea4885ab5c7c11220df05cfb653d5d34a9ef0f2a20dba488314fce4c6e02af300d921

  • /data/data/com.sort.strategy/kl.txt

    Filesize

    423B

    MD5

    123da88f30bdeaacc101bf9aee864096

    SHA1

    483ecd2d44447d617205c8b6ebcc27e0eb73848d

    SHA256

    565fde9016db05e71bf126461a96725874d8bffcb3dbf3971b79cb2ecd7aec8b

    SHA512

    7c60be8bb9e598d240bd387be02939506ae2dfd36ba7cdc98941d1ebea2402e20a59643420a7583fd3b0758d84cfb23df327164c5f3fdc6e4c007b47455d0982

  • /data/data/com.sort.strategy/kl.txt

    Filesize

    230B

    MD5

    3353c67fd522db87ef71ffc59470ecc3

    SHA1

    02ae307a84cb826b970a8a64c9735a039dea83ad

    SHA256

    39379d5fdfc3e5338db15398a2881a11f049d96a8c2cde638502cc71c9b9cd31

    SHA512

    093d6f6418a9887686c2348c3618bbd462161970c43927bc77722530402f6bb5155e99be344fed9d2da690d7d8cfa8df6203644377822e49a9f5279590b353af

  • /data/data/com.sort.strategy/kl.txt

    Filesize

    54B

    MD5

    4f69d8ef2fe25805ac4c678f67fab52d

    SHA1

    f3b1744468446a7ad6cf2985f3b2e26920e45cf5

    SHA256

    1fc50506216fc712ce6fd4ad236dc3e89c1267c2427b2e99f7ba41a611a55a0a

    SHA512

    f4c4405dc3ff04cb56b8ddf48261f1fba20e59df1313b9b88ac29a4201fc86fcd92eaab57512338c7fb5e706e32f2de611d40b86f84e7cb8e04b157d4503918c

  • /data/data/com.sort.strategy/kl.txt

    Filesize

    63B

    MD5

    1cd97625ad8514164be9fdbafdc64c2c

    SHA1

    de6f5696e97e719d3d44b5067c59a87b259d92ae

    SHA256

    b06e378d442e2a299eca8e07d3ec45b9bc0666ae1638669b7ce9716d96e10cb8

    SHA512

    86a5068abc41fdcdebee9df5ab53391687d1a9c1714278d327384c395579e37f468c26325e7926384cc90ceb30b2a0d1c9b5b55ec8c9cb2441c57dcba7eea679

  • /data/user/0/com.sort.strategy/app_tortoise/ljNBiZW.json

    Filesize

    451KB

    MD5

    2a22e03b69c82e52274181882b3b5de8

    SHA1

    ccc1656436ee7f68e1670ec99e390671401a9e2e

    SHA256

    21a92940ed8942cfd99464629c426d6d2329e1fe947a51d8422790cb6d5cdb26

    SHA512

    7448243b0407e4e9891bd55fce68ec6cd00a78cf443023e2f8b0913569ec8cb0ca1be14e2a1b983c1690d248ebd8fd2bc6da7590734e13bce61217822679cb41