Analysis

  • max time kernel
    146s
  • max time network
    129s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    13/04/2025, 22:04

General

  • Target

    c4045907a799785bf2a5e0ae4b8037190cfcd456460a38a619a54da38febb6e3.apk

  • Size

    980KB

  • MD5

    b5391b171220a68f63ff7fd95dbba78c

  • SHA1

    c1077b9f0414bac3d3657bda6d7811e37eddc57e

  • SHA256

    c4045907a799785bf2a5e0ae4b8037190cfcd456460a38a619a54da38febb6e3

  • SHA512

    f5e89e76d2643210293471c9d9acb5a69709374a09b8d840ab161b3750d4163e934a957959a362acab3d511eb49c9a9309e79d2bac4bd0b2baef7f0384c9efcb

  • SSDEEP

    12288:GMuq+CoqedaTWwXKVEUwwSIE3CA2zOH61MH25FHyOfxU/OBunD3++UjwuDrhL0d8:yM325F3fs/UjwuD5b

Malware Config

Extracted

Family

octo

C2

https://brightnest42.sbs/YzhjOGJlMmZkNzNi/

https://swifthorizon19.sbs/YzhjOGJlMmZkNzNi/

https://blueecho77.sbs/YzhjOGJlMmZkNzNi/

https://shadowglide85.sbs/YzhjOGJlMmZkNzNi/

https://crystalpulse23.sbs/YzhjOGJlMmZkNzNi/

https://lunarflame66.sbs/YzhjOGJlMmZkNzNi/

https://stormvortex12.sbs/YzhjOGJlMmZkNzNi/

https://frozenblaze90.sbs/YzhjOGJlMmZkNzNi/

https://solardrift48.sbs/YzhjOGJlMmZkNzNi/

https://thunderquest37.sbs/YzhjOGJlMmZkNzNi/

https://echoridge55.sbs/YzhjOGJlMmZkNzNi/

https://rapidfusion21.sbs/YzhjOGJlMmZkNzNi/

https://cyberwave88.sbs/YzhjOGJlMmZkNzNi/

https://neonhawk33.sbs/YzhjOGJlMmZkNzNi/

https://aquasurge29.sbs/YzhjOGJlMmZkNzNi/

https://firenova75.sbs/YzhjOGJlMmZkNzNi/

https://zenithstorm95.sbs/YzhjOGJlMmZkNzNi/

https://silverorbit63.sbs/YzhjOGJlMmZkNzNi/

https://epicfrost82.sbs/YzhjOGJlMmZkNzNi/

https://goldenbolt14.sbs/YzhjOGJlMmZkNzNi/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

Processes

  • com.sgakagak.agakagabs
    1⤵
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4382

Network

MITRE ATT&CK Mobile v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.sgakagak.agakagabs/.qcom.sgakagak.agakagabs

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.sgakagak.agakagabs/kl.txt

    Filesize

    65B

    MD5

    f7e54d2edf52aaf353cda1f9dfc85e18

    SHA1

    1ab680a23acd41e591bb8e21303c5642cc8ff94a

    SHA256

    e623b61ae8b9f3c3c69656a196cea774ebbe28d253b08de10f5cd4a986aff139

    SHA512

    480547368db05cfa4a875538675999b8e679cc84db61969128a2b4497e5b04f390646365d12256f79b27d5d47fb3dfd2bb1f4e175f99a4e3371640649fb4ca6d