General

  • Target

    chrome-update01255.apk

  • Size

    1.5MB

  • Sample

    230829-jfzxkaag73

  • MD5

    4026a82385c493b2752f4fccc8936fb9

  • SHA1

    165af089f88a2d067218ed6d805b47aa6325173e

  • SHA256

    23941c0c18ead794148aa9b0686161a666cafb257aeb463095d45f057b58fe10

  • SHA512

    3bf9399119d0a9e917b825b30878bd7f98fb891cb47742daedfc1c150a872994e5aa2f67e500da377c05e314d0f2a0062a1dae8df12df6f894ba5d906b107fa3

  • SSDEEP

    24576:b8EXmkywrx7xNMSCjcT4leuauptTtve+07oXPWZODZH7mqqjT2QpAE4KvASD:b8AmjwrBxNM3C4lNau/tv27oX+ZGZbmf

Malware Config

Extracted

Family

octo

C2

https://cm603lzeyxdw.site/MTU2OWE0NzJjNGY5/

https://cm603lzeyxdw1.site/MTU2OWE0NzJjNGY5/

https://arw2he7x57wp.pw/MTU2OWE0NzJjNGY5/

https://9r8i1u84t2gp.online/MTU2OWE0NzJjNGY5/

https://cm603lzeyxdw.biz/MTU2OWE0NzJjNGY5/

https://arw2he7x57wp1.pw/MTU2OWE0NzJjNGY5/

https://9r8i1u84t2gp1.online/MTU2OWE0NzJjNGY5/

https://cm603lzeyxdw.space/MTU2OWE0NzJjNGY5/

https://yjf241z0uu75.info/MTU2OWE0NzJjNGY5/

https://5a9udxg6l6gd.su/MTU2OWE0NzJjNGY5/

https://tv1ed54je1ws.cc/MTU2OWE0NzJjNGY5/

https://63651iz40cio.biz/MTU2OWE0NzJjNGY5/

AES_key

Targets

    • Target

      chrome-update01255.apk

    • Size

      1.5MB

    • MD5

      4026a82385c493b2752f4fccc8936fb9

    • SHA1

      165af089f88a2d067218ed6d805b47aa6325173e

    • SHA256

      23941c0c18ead794148aa9b0686161a666cafb257aeb463095d45f057b58fe10

    • SHA512

      3bf9399119d0a9e917b825b30878bd7f98fb891cb47742daedfc1c150a872994e5aa2f67e500da377c05e314d0f2a0062a1dae8df12df6f894ba5d906b107fa3

    • SSDEEP

      24576:b8EXmkywrx7xNMSCjcT4leuauptTtve+07oXPWZODZH7mqqjT2QpAE4KvASD:b8AmjwrBxNM3C4lNau/tv27oX+ZGZbmf

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

    • Target

      license.html

    • Size

      30KB

    • MD5

      a095d4be2768cb6d37f9aa2de90a8a67

    • SHA1

      2c87de9a26cf1ee17d701c333f088db314b1bce1

    • SHA256

      30d2be0e050b7f1ec5e390326cefedb6e4a6304f5e2a623d0f7678cb67ff308b

    • SHA512

      0ec91a396b39029ec6585215e777495d97e72191438ec37d93e203931a1ac79b1a966e201b9b92982439e3d372f82af98a64914647464d30e1f7f3ab8a558998

    • SSDEEP

      768:/03s/uZ7je9IeMkkEdgC3BOgNMXUgPGaMx6NzJhCgaZpGgPGaxvam:/0c/uZ7je9IeMFIgeOgNMXUg6x6NzJhu

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks