Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    14/04/2025, 22:02

General

  • Target

    d2f9eeabec8e077a9464f1093685396f4e49da39aa7442feada9db2a3f1b6152.apk

  • Size

    2.8MB

  • MD5

    119be7ab68ff6dbde4d1f94a5dcdc2d8

  • SHA1

    314a4809c23e200f3fa004498829dcfdf26cc1c1

  • SHA256

    d2f9eeabec8e077a9464f1093685396f4e49da39aa7442feada9db2a3f1b6152

  • SHA512

    03f15f3e8c659522d1059daf59608f8edaa5a7201795b8c88c2e055ffbc3bf98c058d4caab8fcbce8a8193645760afc9c2e073b7b1964b537ba4a53519c0cac5

  • SSDEEP

    49152:qGFH1fhxdb87B8if7TeDrGLwnogyJBxNwIe7zoMCdbGdIHO6nhmZ:q4ZL6Gif7TeMAsx+Ie/onKWu6nwZ

Malware Config

Extracted

Family

octo

C2

https://196.251.118.53:7117/gate/

rc4.plain

Extracted

Family

octo

C2

https://196.251.118.53:7117/gate/

https://comolokkm3e.xyz/gate/

https://196.251.118.53/gate/

https://196.251.118.53:8080/rootmd50ma/panelcgfuzwxleg9kdxnvy3rv/gate/

https://196.251.118.53:80/builderxxxzz/gate/

Attributes
  • target_apps

    at.spardat.bcrmobile

    at.spardat.netbanking

    com.bankaustria.android.olb

    com.bmo.mobile

    com.cibc.android.mobi

    com.rbc.mobile.android

    com.scotiabank.mobile

    com.td

    cz.airbank.android

    eu.inmite.prj.kb.mobilbank

    com.bankinter.launcher

    com.kutxabank.android

    com.rsi

    com.tecnocom.cajalaboral

    es.bancopopular.nbmpopular

    es.evobanco.bancamovil

    es.lacaixa.mobile.android.newwapicon

    com.dbs.hk.dbsmbanking

    com.FubonMobileClient

    com.hangseng.rbmobile

    com.MobileTreeApp

    com.mtel.androidbea

    com.scb.breezebanking.hk

    hk.com.hsbc.hsbchkmobilebanking

    com.aff.otpdirekt

    com.ideomobile.hapoalim

    com.infrasofttech.indianBank

    com.mobikwik_new

    com.oxigen.oxigenwallet

    jp.co.aeonbank.android.passbook

AES_key

Signatures

Processes

  • com.nameown12
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests modifying system settings.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4312

Network

MITRE ATT&CK Mobile v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nameown12/.qcom.nameown12

    Filesize

    48B

    MD5

    046a414913add6f5bb60072c7db819b6

    SHA1

    451ee4f6809260aec622d772fd329c7d0297a842

    SHA256

    b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a

    SHA512

    4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

  • /data/data/com.nameown12/app_mph_dex/classes.dex

    Filesize

    449KB

    MD5

    68303b26471d260524fef541491f5f32

    SHA1

    d75c1ee936588cd530f6f4b7b0b4d81c0d7c1a14

    SHA256

    9c5a2f908328f224663e5df788f66c03861a86c8b4fc6b9a8f2c157e7c118a0c

    SHA512

    300b0c9a5c6f51cf1d2c89004f76eb804987febfe608f3817fbf5b722211ff693c577795dc3af152164a388c7aaffa90a6057a5d96f1fbd3d38bf75483640582

  • /data/data/com.nameown12/app_mph_dex/oat/classes.dex.cur.prof

    Filesize

    463B

    MD5

    9c8c904a5bb2e45fa34c036391566668

    SHA1

    913e539cc2b19ddbcded340040b21d545a8316d2

    SHA256

    4011ee34708ce3319b9c2944b2efe8fcaa4904d00675fea5000c1408770ed927

    SHA512

    c58a1cebdbeaa434fe0c9c8eb57ceff5492e112ac18439f30fa251f4e7cc9365fcae75d83cc18237466f2c3c3ccc46584d104df1ec1be37d677253cf78c596c6

  • /data/data/com.nameown12/kl.txt

    Filesize

    63B

    MD5

    2c3e50cc8773b14ac9f90eec287fa803

    SHA1

    773ec0b9109d9368b7cd808be0672454d96a3139

    SHA256

    7d7a56b4e2fbcc6955c1d1b228414cf21696e6f4753912c64540d3b79e706ecf

    SHA512

    7d13e91182125c8c4dabbec66784bc5b833a62d513d3df0c7a76eb93e8247c618896154a42d3c320b6271850026d5c330d5d3e45e887847a5424b7cde6c16466

  • /data/data/com.nameown12/kl.txt

    Filesize

    423B

    MD5

    57630c67dd8c5c9a0b15257492bb3aae

    SHA1

    afdc2bbffa580684e3aa96e786b056ba4da5528a

    SHA256

    84dbfc16be125c26d16fff4c8a945f9d317a96e3806a957fabee41dd31e20607

    SHA512

    335bda516788e8fa37371658633b95538b940da5d952f3184a171e8f56f5fe04bf33d258fb71d9f17b763116ff7d28dd1fd6428b61cf32a53cb4cdb0afb04ec2

  • /data/data/com.nameown12/kl.txt

    Filesize

    230B

    MD5

    b9fea17f860a610a572d31408c25725c

    SHA1

    0c17242d7c588806e0370ad2e9da0b4cb14d8bef

    SHA256

    881fbd94a4fe2d4c8a79d89a9302ff08d9d14d7e6ad62bc084b204d3c29c07b0

    SHA512

    3ba7a841f9a52ee1d6f22846b37ef80d4778778f490f5e37518e22eb765c0479355172e07be01b43942ec7d84b2a0b43ce20655400a47b1a8a3f6110514d343f

  • /data/data/com.nameown12/kl.txt

    Filesize

    54B

    MD5

    f3560d16cd38c563401d806b13d058ee

    SHA1

    728bb388a8e7d18321e2bafc2110b6cd1aa4807e

    SHA256

    0f55a28afa90f472b766901612e90480a221e551fa9e112770984ede5e0ef5e0

    SHA512

    936b55738b853844c6c8d63977a544622a03897ea60b01680cd08ae813577ce88603457fa00c8b6245fdbe645a72a6a7e5887491bcebc423ee3848722b90bc0a

  • /data/data/com.nameown12/kl.txt

    Filesize

    68B

    MD5

    d2379f14b1e7d847e3604793aee58c1e

    SHA1

    50b6d59b81f14898c614b8e788135980cb52136f

    SHA256

    b0ee6412a2a7bfc252bb5aec48a65fc17b11c752ffdea1378acd076326072830

    SHA512

    5ee62de2061808a29b4ba1f0289dc868920243cf4158b6b661671f9c5ac6dc70a5b3d1484d3a11057121de8c22e607a5b073e39097cedae7254af77935597939