Resubmissions

15/05/2023, 13:37

230515-qw8mzaea5v 10

14/02/2023, 10:19

230214-mcmdvabh8z 10

General

  • Target

    GooglePlay23Update.apk

  • Size

    527KB

  • Sample

    230515-qw8mzaea5v

  • MD5

    606b94fa8407316bcddaab6c35b64bc8

  • SHA1

    77227e9a1d78d2968f07f6d4be63811a2333bd16

  • SHA256

    32bd4e699c237655c164e36c3fe83d1a9c14b5218aa42b82bf962254e804b0a3

  • SHA512

    0ea99a7967212f574dd490dea41af2e1c9686426318804f5b060baf1d60ea08a7d2efa781b80e656a4764a9d86ef57eeb5b8df09871d1fff64d703edbc94ec2f

  • SSDEEP

    12288:3oLyYS1nveZfhtfLsRyYgO/jgs38BoCGpFuN++1xbdV7YQB:wyYS1vgNe/jg28BdcuQsxbgQB

Malware Config

Extracted

Family

octo

C2

https://2fdghhoo11.top/doc/

https://3fdghhoo11.top/doc/

https://4fdghhoo11.top/doc/

https://5fdghhoo11.top/doc/

https://6fdghhoo11.top/doc/

https://7fdghhoo11.top/doc/

https://8fdghhoo11.top/doc/

https://9fdghhoo11.top/doc/

https://10fdghhoo11.top/doc/

https://11fdghhoo11.top/doc/

https://12fdghhoo11.top/doc/

https://13fdghhoo11.top/doc/

https://14fdghhoo11.top/doc/

https://15fdghhoo11.top/doc/

https://16fdghhoo11.top/doc/

https://17fdghhoo11.top/doc/

https://18fdghhoo11.top/doc/

https://19fdghhoo11.top/doc/

https://20fdghhoo11.top/doc/

https://21fdghhoo11.top/doc/

AES_key

Targets

    • Target

      GooglePlay23Update.apk

    • Size

      527KB

    • MD5

      606b94fa8407316bcddaab6c35b64bc8

    • SHA1

      77227e9a1d78d2968f07f6d4be63811a2333bd16

    • SHA256

      32bd4e699c237655c164e36c3fe83d1a9c14b5218aa42b82bf962254e804b0a3

    • SHA512

      0ea99a7967212f574dd490dea41af2e1c9686426318804f5b060baf1d60ea08a7d2efa781b80e656a4764a9d86ef57eeb5b8df09871d1fff64d703edbc94ec2f

    • SSDEEP

      12288:3oLyYS1nveZfhtfLsRyYgO/jgs38BoCGpFuN++1xbdV7YQB:wyYS1vgNe/jg28BdcuQsxbgQB

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks