Analysis

  • max time kernel
    141s
  • max time network
    169s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    11/04/2025, 22:09

General

  • Target

    7a02fec77c8e49b5cda238a3af6ad2688570c38bdb296562ef20679d2004beff.apk

  • Size

    2.9MB

  • MD5

    140f4aea0e8588d718c4f2d8b73839fd

  • SHA1

    569acc5177caccd6b062727b6af4bf4f546c5723

  • SHA256

    7a02fec77c8e49b5cda238a3af6ad2688570c38bdb296562ef20679d2004beff

  • SHA512

    2943793ce481692fa2ada9a15f91380028305a9783bd747d647fcd28e2a80331ab0ee9c2e55d0a107cc293b77815ca87063681f810c6d891c02caed11717fab3

  • SSDEEP

    49152:MqbMTgUyiJYJtjc6IA01IqcdeEnTIll/z/xppr21Mg1bCjEA8O0VjZIe1Leo0ZWc:MqbMsUyKSdcFdyqcc9lBbxzaz12jB894

Malware Config

Extracted

Family

octo

C2

https://vurtancanerefsaneleri.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerdusunceler.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerhayatizleri.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerzamanakarsi.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanersanatkulubu.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerkaleminden.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerhikayeleri.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancaneranilaridan.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanersezgiseli.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerleylabahar.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerdalganotu.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanergozundeki.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerkosusunda.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanersesindeyiz.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanergercekleri.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanersonsesler.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerbilincinde.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanergezegeni.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerkalemligi.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerduyularda.xyz/MzhiMTg0NTAwOTY5S/

rc4.plain

Extracted

Family

octo

C2

https://vurtancanerefsaneleri.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerdusunceler.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerhayatizleri.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerzamanakarsi.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanersanatkulubu.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerkaleminden.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerhikayeleri.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancaneranilaridan.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanersezgiseli.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerleylabahar.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerdalganotu.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanergozundeki.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerkosusunda.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanersesindeyiz.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanergercekleri.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanersonsesler.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerbilincinde.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanergezegeni.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerkalemligi.xyz/MzhiMTg0NTAwOTY5S/

https://vurtancanerduyularda.xyz/MzhiMTg0NTAwOTY5S/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.remove.odor
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4334
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.remove.odor/app_enact/QlJleT.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.remove.odor/app_enact/oat/x86/QlJleT.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4363

Network

MITRE ATT&CK Mobile v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.remove.odor/.qcom.remove.odor

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.remove.odor/app_enact/QlJleT.json

    Filesize

    153KB

    MD5

    ee04045b882ffb6dcd618063ff2326ee

    SHA1

    3b89cb8482059d5220ab34502e8e3a558b407e76

    SHA256

    b0200e4a1837f1a2d83ed0d39fe84835b4cedf640a54c1b782119f82ae7d511b

    SHA512

    adb85fb0d055dc499d02e1ee4b9caa627ff8eac91db1b58d79c95721101554725442a7b3b7635f1b223d64c01221b270acf7c7fe58df488ec03c935838fa12f8

  • /data/data/com.remove.odor/app_enact/QlJleT.json

    Filesize

    153KB

    MD5

    7cdb9b1450e1d76dcc21f5f382ad24cc

    SHA1

    c3ce040bec50c93d25036c3d0c5471fad330b7a4

    SHA256

    4c64b29211fb9d8c128139a99b4a87b8442395475fdea6d9fae3bb9e5780591e

    SHA512

    7fade798dda115d11bddd8656bed3f05abb727a0306c14f5143173398f83d28301be8509d8ec460b237d046870b1d46ef8f1b11ff8ce721521c3341d769df9e7

  • /data/data/com.remove.odor/kl.txt

    Filesize

    45B

    MD5

    734911bb714a2c0bd338c4f84d15442f

    SHA1

    a6507c5688ba973da9598ce35ac385cc9b177b93

    SHA256

    1ab8d1aa995966c587a52a33ea6ac1db733625f7a219a1c940ea1594f12cd298

    SHA512

    2286582409dd741b316c6548cd10a5c48274209bc5735f0f4d050e9c1345473e8d2ee5ee1311c1f073fe40e73f03b792e18f0149cfa9f345da6a9ad6a08314d2

  • /data/data/com.remove.odor/kl.txt

    Filesize

    423B

    MD5

    b4d28dc6dd98917f866702e591c95664

    SHA1

    73a18e979ec03cfe463f2192b4e7bc93f1bab5fc

    SHA256

    1ba5b0e64fcfafc26d872aa16d6943913904c33a8731088cbc749c440bf4afe4

    SHA512

    4b5442c46513b8fc3734919bf7ba5cafa33fcdbfaab6c82475dafdfe5362cd7ec5d8dd5687db111a2e1dd027bf7730d2e295a9d61bf28f7f720e9e2185e5935c

  • /data/data/com.remove.odor/kl.txt

    Filesize

    230B

    MD5

    55d1fd54e7bb7e79ab7f33f6324c859e

    SHA1

    96ce62e612c90a4df4878721ddecc89e5eb9424f

    SHA256

    c75067aab98a273e2a48dcc7353c555a402f7c1d9e66d61a5bda561fbf537f1a

    SHA512

    b85133ce573d8dcc4f2b4a626bd589570023f5be2c20a77772217eebc20ea2e1ce9cf21345a514195f4e33b53d2b33caa46f9b14867c47c2250280fa539158e2

  • /data/data/com.remove.odor/kl.txt

    Filesize

    54B

    MD5

    f3053cea5ba795e0bbbd4a41d8c0dac2

    SHA1

    e173f2fa45c03d3b45a9224e7d6c82484a2b995d

    SHA256

    7e91c6fac39c45b8025dc065f53fc58354829f9b6e8c8d269965425d8dd21bed

    SHA512

    fee408517a2845eac84e51c9f4c6e22912ba6574345d3aeef577dec88ed0cd20c8c34731685ae4f6b9b0a4544fab6e700bc31e7cb8bf0d253cbb8e00ae43bf5e

  • /data/data/com.remove.odor/kl.txt

    Filesize

    63B

    MD5

    14b263e93036d281b7e71206cd4e230f

    SHA1

    89b927d4e274a342ee19de6bd31bdf5f08305ab0

    SHA256

    fa72fbb233e0bf3989364be970ff5d5ae47f88a369214b2b38c2cb4802f82035

    SHA512

    f362dc028e8c4d6237713a553473f3c6f273cd300206c5a461c8708d11aaac1e6873f88bcb50a9a425ba5f2f5985744e43c39a22398e4d148761df52e78af727

  • /data/user/0/com.remove.odor/app_enact/QlJleT.json

    Filesize

    450KB

    MD5

    57db85e40bebe9b5a3673210a614e913

    SHA1

    e37ac4dc3b2ab251dff8f236fddc30eb5011140c

    SHA256

    d90fdef3c61205cdb7a730c19414212cec3189a4ed1d4bfe97a1a65b73137ecc

    SHA512

    5977fc978b93b85d73b5e10de5f3e05d7f7ca13d8220465a09e061b1634b63093834d37637b799a62e8d6e6e02dfc091fec224cd86916b31df621ad5d042dc3c

  • /data/user/0/com.remove.odor/app_enact/QlJleT.json

    Filesize

    450KB

    MD5

    66621deb3d3175450cfaaec87bff6a86

    SHA1

    28edcc9cc0c3651a862f197ec377edaa0685a48f

    SHA256

    753b3baec26ebe4a3b69280bd6b0fc67875063900ccdd97b7c089c1932729a6d

    SHA512

    bc25635fa93933e8a1141a23d0d4136fea5c6ca078b85778a1813fd8ba1693a86bf6d0887b76eaebda4ef88a80a2a0a94e8bee36b96cef3093f4b4df8344760f