General

  • Target

    cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3.bin

  • Size

    541KB

  • Sample

    230904-1wwzaabh26

  • MD5

    392c9aef3ff168163f99a0669675cc63

  • SHA1

    6959b63f22b5728e536de902b70c880f1908ef13

  • SHA256

    cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3

  • SHA512

    f26f24f83f6278fcb4b267e9949a3255a5b03bd5be176b74f43e21315d64e5b5c07c77ddc3eaf78f5f39cecc3f028a493e5ce4e10f849b39b8c2044cbb9cf11f

  • SSDEEP

    12288:AYd77xNfkhSme6PFIJefUnZBeB415sBuqOdB5aGQp5gHtxnC:AYd7zfkEmepJkUZBI41mcLa9itxnC

Malware Config

Extracted

Family

octo

C2

https://keplistensan.site/YWRhZjAxNGM1YjFh/

https://ikranjsfyu.space/YWRhZjAxNGM1YjFh/

https://ujsayhhfsakl.fun/YWRhZjAxNGM1YjFh/

https://hduuooasdj.website/YWRhZjAxNGM1YjFh/

https://pkasjjfoosa.host/YWRhZjAxNGM1YjFh/

AES_key

Targets

    • Target

      cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3.bin

    • Size

      541KB

    • MD5

      392c9aef3ff168163f99a0669675cc63

    • SHA1

      6959b63f22b5728e536de902b70c880f1908ef13

    • SHA256

      cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3

    • SHA512

      f26f24f83f6278fcb4b267e9949a3255a5b03bd5be176b74f43e21315d64e5b5c07c77ddc3eaf78f5f39cecc3f028a493e5ce4e10f849b39b8c2044cbb9cf11f

    • SSDEEP

      12288:AYd77xNfkhSme6PFIJefUnZBeB415sBuqOdB5aGQp5gHtxnC:AYd7zfkEmepJkUZBI41mcLa9itxnC

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks