General

  • Target

    google chrome.apk

  • Size

    1.9MB

  • Sample

    230907-hks45sfc29

  • MD5

    206ef4d8c65e7e826cad668c0b5e122e

  • SHA1

    10b3a7213d90cf8f6ddedee051e0920409f2846a

  • SHA256

    59f8a393a30d1754e0ba9768aa4eaeeecdb838b79f6374061116a6cf8a0d5fcd

  • SHA512

    0a86b368cfc43bc4e12df915d3c44ac6473e6cc25222e481766980e87f4191efb988f27cb0fe221355971703b83bc5999268f0c64b4a4ae650916e9d11cadc73

  • SSDEEP

    49152:DYaRSfALycw1LSlZ9fLp88wNJwFdKZu6BOU3PuDT:DYaR5mOZ9Tp81fLZnBOOG

Malware Config

Extracted

Family

octo

C2

https://grpweufnh734bfr3.online/N2Y5ZmU3OTI5ZDky/

https://poewjehfbwery47fr.top/N2Y5ZmU3OTI5ZDky/

https://fcercvv7erwcvnrew.site/N2Y5ZmU3OTI5ZDky/

https://wevmuty56gbfdg.xyz/N2Y5ZmU3OTI5ZDky/

AES_key

Targets

    • Target

      google chrome.apk

    • Size

      1.9MB

    • MD5

      206ef4d8c65e7e826cad668c0b5e122e

    • SHA1

      10b3a7213d90cf8f6ddedee051e0920409f2846a

    • SHA256

      59f8a393a30d1754e0ba9768aa4eaeeecdb838b79f6374061116a6cf8a0d5fcd

    • SHA512

      0a86b368cfc43bc4e12df915d3c44ac6473e6cc25222e481766980e87f4191efb988f27cb0fe221355971703b83bc5999268f0c64b4a4ae650916e9d11cadc73

    • SSDEEP

      49152:DYaRSfALycw1LSlZ9fLp88wNJwFdKZu6BOU3PuDT:DYaR5mOZ9Tp81fLZnBOOG

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks