Analysis

  • max time kernel
    145s
  • max time network
    158s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    12/04/2025, 22:00

General

  • Target

    2fd251b032260f3ee0eceb4fd4a6ca792d98e9f6bc0b924e5fae4bf37b23e686.apk

  • Size

    4.0MB

  • MD5

    9284df4b44142e4658b86bc67b6c2dc7

  • SHA1

    9583df8868cfc7668725c3cfa7d69476f8d782a4

  • SHA256

    2fd251b032260f3ee0eceb4fd4a6ca792d98e9f6bc0b924e5fae4bf37b23e686

  • SHA512

    e0eca707bfd251d26a36c210b9712a1e05bbda4183174ad9fa290611e15303972c26447cac5057d9f67cf6623f217b523b63195bd5b599e8802109c9aeee20d5

  • SSDEEP

    98304:8dOdd6jymO38l8AoebZCkvfYsd80HMw05I0ULzmco/4kSWqn2zWqnJcqN:Ld6jAvAxZy0WIjo/4DYl

Malware Config

Extracted

Family

octo

C2

https://hizliveguvenilirshopbutik.com/MzMxNzE5MjExY2Q3/

https://pre234232iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://pre242252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://pre221252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://3413pre2343252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://532343252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://63343252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

rc4.plain

Extracted

Family

octo

C2

https://hizliveguvenilirshopbutik.com/MzMxNzE5MjExY2Q3/

https://pre234232iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://pre242252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://pre221252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://3413pre2343252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://532343252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://63343252iumserviceds.xyz/MzMxNzE5MjExY2Q3/

https://3345veguvenilirshopbutik.com/MzMxNzE5MjExY2Q3/

https://hizliveguvenilirs355334ik.com/MzMxNzE5MjExY2Q3/

https://hizliveguv35354334pbutik.com/MzMxNzE5MjExY2Q3/

Attributes
  • target_apps

    at.spardat.bcrmobile

    com.google.android.apps.messaging

    com.android.mms

    com.samsung.android.messaging

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

AES_key

Signatures

  • Octo

    Octo is a banking malware with remote access capabilities first seen in April 2022.

  • Octo family
  • Octo payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests modifying system settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.formgrowyhst
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4479

Network

MITRE ATT&CK Mobile v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.formgrowyhst/.qcom.formgrowyhst

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.formgrowyhst/app_cement/Yl.json

    Filesize

    1.0MB

    MD5

    4bff21c4d3bc47896412344d66011549

    SHA1

    78b3e8ff517d9ffe5e000ac390d5e2faa62dd196

    SHA256

    d7c450a8ab4e88b718903b20423bd899b0f371c80e48093a4b22632df2b57f45

    SHA512

    bd15f5a3ccaec1e23d8f1e186e7a3ee9d5fe51cc7235fcfd89a78f1a73af626cbbcc23e75d8f97f2fdeef86c2d2021a9f0cd523dfa677f5f22f4c6c9b9081e34

  • /data/data/com.formgrowyhst/app_cement/Yl.json

    Filesize

    1.0MB

    MD5

    9ccaab69660bd42a5cbd0f3e04d218aa

    SHA1

    b9888c1630531c13227154010380fce3ae36b5d8

    SHA256

    b1d633535f5e4d89f702c63643af8d75d3e7ebb7b75aad863f4994c2d8283b4c

    SHA512

    43a9a3a6a7a020c473e841c42c0d352962b2fb5c47a52364ce0d7990f7f1bb897eb817069d1fe0d4152f53f3076bbaf70a3cfc71849bece3bb7454ad28f64f6b

  • /data/data/com.formgrowyhst/cache/fblbpgwjuavcjdc

    Filesize

    977KB

    MD5

    977c589f339a9059d7ccb24353e335cc

    SHA1

    7cb293eb9d3b8a3cb1aa0c39df1e06802d39f507

    SHA256

    068509a91a70d4368b956e3071e55a81bc02c691ecc9496a37d2728bd6d7606b

    SHA512

    f5f79c6e9c6dea8a2599c87380e5e6e000f6bc1fea0f20ecdd5289954fc45dca6979df608f617fb561a571384a333e82bccb1dc8f19f4936c5418e2876a06865

  • /data/data/com.formgrowyhst/cache/oat/fblbpgwjuavcjdc.cur.prof

    Filesize

    399B

    MD5

    cc7554c7bd41482dcdbe5dd82256f769

    SHA1

    4eeee500cd1529aea684525f4d6b0d53d9dae1cb

    SHA256

    8e4213ec99892d4172c06a0c7b6fbee6e563bd62a1c368fd29d5399402b545d4

    SHA512

    076f5cff1f408394463e0be3fdcac51d3a84957028ccbb721f4e3f8e8e5222553c8972132b74eabf3c2dd198e923889969c73d641a499af0965c9b137e6c5035

  • /data/data/com.formgrowyhst/kl.txt

    Filesize

    504B

    MD5

    04520207cfe210fe606d136f009ed97c

    SHA1

    92cc030256954494cf48c9be2dc5e6c69476bf76

    SHA256

    44f3a0eeb76d0013632591a4ed4703c94032ff7e8e65197cc18ab4777e069900

    SHA512

    7763abbe1b963731519442f9787dcea37a82b913b19ce2135d1ce8807a7cdbbf9376e9b84ba715997dcf8fecf5a233a3ff6facf69e2be55c51e3c6ace5fae6c5

  • /data/data/com.formgrowyhst/kl.txt

    Filesize

    221B

    MD5

    963e60c4b554ea8fe8770405773cbb8c

    SHA1

    4532ceaeb09393cfe2daa9d50e22cbc854b2e8b4

    SHA256

    a91bc666943ac4b232363c602aabb3df46b4ac243f08923c3868ace558d38f13

    SHA512

    c5859cbbc7d4a6dc2ed88182f21e2f6ee6bdd48d9ceb57c1bc9110a55356b6afe59ef2eb1b8b4817511bcc006d0bea8ce5c241fb9662859da3decfe20a8b8912

  • /data/data/com.formgrowyhst/kl.txt

    Filesize

    54B

    MD5

    f9c458508f2e5e06b3483709662984aa

    SHA1

    339210091652961d928557cf54b67f82d05e9c61

    SHA256

    2637215a604bfda92c8dff049dd849fd3a62119ebd16d6bd5daf640e87cfe16c

    SHA512

    662a0544457b12640a34760031190c666a85f032c6f405320433717ed19ced68f941e2ab109f5c52df92c66640ebf916ca393cde51dd1d75f2fdbc0c7ab2d5d3

  • /data/data/com.formgrowyhst/kl.txt

    Filesize

    68B

    MD5

    91e1bdd8c4d69653b9f39cdde363f4ad

    SHA1

    e85070ee9dcd5830368c96f3f75e2a43b6a05c3e

    SHA256

    6cdf23a6e2cdd900733523a3690d860dc0d94b64f19bdfc082c4ee5426aed1a6

    SHA512

    13bc9e6a5a0b94477d744a446071cff32d25ffac04ed8aadc0072ef9434958f8f0056594bd3574e630a0e7bf15ff267d3070ed68622a84c85ce321a0fa3de0c2

  • /data/data/com.formgrowyhst/kl.txt

    Filesize

    60B

    MD5

    2a009efb16bb1e468e79dd35ea596069

    SHA1

    b3cd3792d6fd98519d8762d633bf00e6236a1356

    SHA256

    5d81d04fb3f0e7119e9c3341f27a67c6b48bed575da5f2a1e9f39600026abfd5

    SHA512

    20ce3e60bccf74ec404bcf9a7fcd95728ddb7bb8f56015aa4012f0fb4558a8cfe0521c7fab248fa4320833d8966406855b52af9de6bec77a3cf03d6a3dd16a40

  • /data/user/0/com.formgrowyhst/app_cement/Yl.json

    Filesize

    3.0MB

    MD5

    6a37153ecb3827ad7d6b218664cf3fe2

    SHA1

    74d07ce63973f0f5fc9210860319d4a6c77367b3

    SHA256

    7fd217c2ae6c6d9ced1e8c09d148ede5aff65b049cf899f0eb5c834cb7ffbfa2

    SHA512

    ddd50f2594f644bbb6b896c67e577f5afb7ad86f7c778de175cdd69fa8f7ffc9200c82eba70241f48243b0aa3057fca3a47e6a616c603a6ecb9c608b92fba82f