General

  • Target

    2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c.bin

  • Size

    541KB

  • Sample

    230826-11pqrsdf67

  • MD5

    2293d21064a4547973f813478798914b

  • SHA1

    5cc3611160c229aa3adce747aff504ccaaaae83a

  • SHA256

    2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c

  • SHA512

    aff8797636b16d9be0cf3ed4f433e61696011e0ec09551babb396cbcb50bf99bbbf51a2e32419fca33857f2f0723cec5b8162d09149e392086b5050bc3f3bad2

  • SSDEEP

    12288:uljZOqGS7AUQwjG+toqQSJSbBwdAytJi+oR2xp3IYwgIe2aiV0aNwf:09Oqp7XGQQSJSwdrdpU7eo+aM

Malware Config

Extracted

Family

octo

C2

https://176.111.174.151/Y2NlMmYyMmYwMGI5/

https://ghost23241312.xyz/Y2NlMmYyMmYwMGI5/

https://ghost232412512.xyz/Y2NlMmYyMmYwMGI5/

https://ghost232412312.xyz/Y2NlMmYyMmYwMGI5/

https://epinciifirarda227.xyz/Y2NlMmYyMmYwMGI5/

https://epinciifirarda27.xyz/Y2NlMmYyMmYwMGI5/

https://epinciifirarda237.xyz/Y2NlMmYyMmYwMGI5/

https://epi2nciifirarda227.xyz/Y2NlMmYyMmYwMGI5/

https://epi3nciifirarda27.xyz/Y2NlMmYyMmYwMGI5/

https://epi5nciifirarda237.xyz/Y2NlMmYyMmYwMGI5/

https://idriskocovali1900.net/Y2NlMmYyMmYwMGI5/

https://idriskocovali1784.net/Y2NlMmYyMmYwMGI5/

https://idriskocovali9651.net/Y2NlMmYyMmYwMGI5/

https://idriskocovali258.net/Y2NlMmYyMmYwMGI5/

https://idriskocovali147.net/Y2NlMmYyMmYwMGI5/

AES_key

Targets

    • Target

      2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c.bin

    • Size

      541KB

    • MD5

      2293d21064a4547973f813478798914b

    • SHA1

      5cc3611160c229aa3adce747aff504ccaaaae83a

    • SHA256

      2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c

    • SHA512

      aff8797636b16d9be0cf3ed4f433e61696011e0ec09551babb396cbcb50bf99bbbf51a2e32419fca33857f2f0723cec5b8162d09149e392086b5050bc3f3bad2

    • SSDEEP

      12288:uljZOqGS7AUQwjG+toqQSJSbBwdAytJi+oR2xp3IYwgIe2aiV0aNwf:09Oqp7XGQQSJSwdrdpU7eo+aM

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks