General

  • Target

    056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5.bin

  • Size

    541KB

  • Sample

    230911-1wyg4sbg24

  • MD5

    cfbb42ce764505ed033b933e60036c91

  • SHA1

    a111b15f1e0d0d64d5f2947d60fcf4bb3e00bbff

  • SHA256

    056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5

  • SHA512

    9cf34a131d15b381f7152b1877bb0edd5bf2dbe6a895eaae18155c281cb6157fb7dbef75600d758fc28d3c824ad33d04251a702ebb27bb3bcb5f9560716e4f20

  • SSDEEP

    12288:zmgiCdq8SjOiUmtyFUBzT21PvJh9EysXmVDZ+ethOXnL:zmxCdeSIJBzT+i4DZ+eDMnL

Malware Config

Extracted

Family

octo

C2

https://185.122.204.122/MDViMDU3NDYwMTBm/

https://trattotarakoniyse.com/MDViMDU3NDYwMTBm/

https://trattotarakoniyse.xyz/MDViMDU3NDYwMTBm/

https://trattotarakoniyse.net/MDViMDU3NDYwMTBm/

https://trattotarakoniconti.com/MDViMDU3NDYwMTBm/

https://trattotarakoniconti.xyz/MDViMDU3NDYwMTBm/

https://trattotarakoniconti.net/MDViMDU3NDYwMTBm/

AES_key

Targets

    • Target

      056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5.bin

    • Size

      541KB

    • MD5

      cfbb42ce764505ed033b933e60036c91

    • SHA1

      a111b15f1e0d0d64d5f2947d60fcf4bb3e00bbff

    • SHA256

      056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5

    • SHA512

      9cf34a131d15b381f7152b1877bb0edd5bf2dbe6a895eaae18155c281cb6157fb7dbef75600d758fc28d3c824ad33d04251a702ebb27bb3bcb5f9560716e4f20

    • SSDEEP

      12288:zmgiCdq8SjOiUmtyFUBzT21PvJh9EysXmVDZ+ethOXnL:zmxCdeSIJBzT+i4DZ+eDMnL

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks