General

  • Target

    8f7c1264221b39a497dab9c48.bin

  • Size

    541KB

  • Sample

    230703-x6p2yahh27

  • MD5

    6e1e14c98a4e68758821c1e56c98dc75

  • SHA1

    5d7beb327b52541e25707aa1d7e928ceaf6e3610

  • SHA256

    8f7c1264221b39a497dab9c4802a7d1a665f16238ee1754dc9c8725587c914e7

  • SHA512

    8e19b106cf912bc19c08b408aafc1c503c266c568399f8bc556fc00c6d01f2ac237092d296fb4f4285ebd4193f8e6f1936d2c3840a1ff0d49777ffda750c7faa

  • SSDEEP

    12288:D9RF1ukmLuxshw6YmRvilVJXl4lEeDqeWB33QXTMDf/0ZIcJ:D97gL5TRviLIfDzWBFD/0DJ

Malware Config

Extracted

Family

octo

C2

https://185.252.179.90/MGM2YzAzZGJlZTQz/

https://allahkitapads1940.xyz/MGM2YzAzZGJlZTQz/

https://parakazaniyozamcik323232123.xyz/MGM2YzAzZGJlZTQz/

https://anayinamiusom/MGM2YzAzZGJlZTQz/

https://birakyakamiorsupuogluusom312/MGM2YzAzZGJlZTQz/

AES_key

Targets

    • Target

      8f7c1264221b39a497dab9c48.bin

    • Size

      541KB

    • MD5

      6e1e14c98a4e68758821c1e56c98dc75

    • SHA1

      5d7beb327b52541e25707aa1d7e928ceaf6e3610

    • SHA256

      8f7c1264221b39a497dab9c4802a7d1a665f16238ee1754dc9c8725587c914e7

    • SHA512

      8e19b106cf912bc19c08b408aafc1c503c266c568399f8bc556fc00c6d01f2ac237092d296fb4f4285ebd4193f8e6f1936d2c3840a1ff0d49777ffda750c7faa

    • SSDEEP

      12288:D9RF1ukmLuxshw6YmRvilVJXl4lEeDqeWB33QXTMDf/0ZIcJ:D97gL5TRviLIfDzWBFD/0DJ

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks