General

  • Target

    d518a26b3d98d4a8e1c0552e38da9bd70b43d626cfec71c831c1ad5314c69685.apk

  • Size

    1.4MB

  • Sample

    220614-hvhq6agef5

  • MD5

    318a13b57c37c485cbb3a7ca8067f21f

  • SHA1

    136a1bf821a9af5ba6b658bacd27580b3c3988df

  • SHA256

    d518a26b3d98d4a8e1c0552e38da9bd70b43d626cfec71c831c1ad5314c69685

  • SHA512

    e53e37fcddbe6ec3947d0239933b36aaa7ccb1b71fbe3c02e37202191f9d5629f850d2e02a45788b2a63b5732d2abd664876a881eb4286ae141ce0b57af3a1a3

Malware Config

Extracted

Family

octo

C2

https://ifn1h8ag1g.com/MWNhMjI2OTkyNjA3/

https://irha3wzuu.top/MWNhMjI2OTkyNjA3/

https://uhnazu3au.top/MWNhMjI2OTkyNjA3/

https://hbaruuau3h.top/MWNhMjI2OTkyNjA3/

https://8ibaub3bav.com/MWNhMjI2OTkyNjA3/

https://ifua88ahahgh.com/MWNhMjI2OTkyNjA3/

https://utabwbazuu.com/MWNhMjI2OTkyNjA3/

AES_key

Targets

    • Target

      d518a26b3d98d4a8e1c0552e38da9bd70b43d626cfec71c831c1ad5314c69685.apk

    • Size

      1.4MB

    • MD5

      318a13b57c37c485cbb3a7ca8067f21f

    • SHA1

      136a1bf821a9af5ba6b658bacd27580b3c3988df

    • SHA256

      d518a26b3d98d4a8e1c0552e38da9bd70b43d626cfec71c831c1ad5314c69685

    • SHA512

      e53e37fcddbe6ec3947d0239933b36aaa7ccb1b71fbe3c02e37202191f9d5629f850d2e02a45788b2a63b5732d2abd664876a881eb4286ae141ce0b57af3a1a3

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo is a banking malware with remote access capabilities first seen in April 2022

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks