Resubmissions

20-09-2023 14:50

230920-r7rn9sgh6z 10

11-09-2023 22:03

230911-1ygblsbg39 10

General

  • Target

    6153966e76e62c9a812601469553a291f1bc1f26c9e7ff56f0d3e0a28d6cf8ce.bin

  • Size

    1.5MB

  • Sample

    230920-r7rn9sgh6z

  • MD5

    44e83dd5257260cf5c9e85100c016116

  • SHA1

    22dc9c4250b9fdb837573308b3a2a6755f9d4b36

  • SHA256

    6153966e76e62c9a812601469553a291f1bc1f26c9e7ff56f0d3e0a28d6cf8ce

  • SHA512

    3cf9e9fa46a669bcc996c9b58883108bc463e0a3e73aeeb53387ec17c579fc8b18ac18c55201255571a5d853c4cf77943d4e38752091753fb6abc9df99f323ed

  • SSDEEP

    24576:a7caN4hTiPRj7yphSSVxBLTDWXXaZODZH7mqNThUIHAE4KvAS1Q:aoaETgy//VnnWXKZGZbmqhqIHAE4KoSW

Malware Config

Extracted

Family

octo

C2

https://blessedik591.info/MTU2OWE0NzJjNGY5/

https://cm603lzeyxdw.site/MTU2OWE0NzJjNGY5/

https://cm603lzeyxdw1.site/MTU2OWE0NzJjNGY5/

https://arw2he7x57wp.pw/MTU2OWE0NzJjNGY5/

https://9r8i1u84t2gp.online/MTU2OWE0NzJjNGY5/

https://cm603lzeyxdw.biz/MTU2OWE0NzJjNGY5/

https://arw2he7x57wp1.pw/MTU2OWE0NzJjNGY5/

https://9r8i1u84t2gp1.online/MTU2OWE0NzJjNGY5/

https://cm603lzeyxdw.space/MTU2OWE0NzJjNGY5/

https://5a9udxg6l6gd.su/MTU2OWE0NzJjNGY5/

https://f2kic1nam25n81k.cc/MTU2OWE0NzJjNGY5/

https://maza5rra11vti251mca.info/MTU2OWE0NzJjNGY5/

https://cleverk21da912mca.live/MTU2OWE0NzJjNGY5/

https://zazarazgok7215vor1.pro/MTU2OWE0NzJjNGY5/

AES_key

Targets

    • Target

      6153966e76e62c9a812601469553a291f1bc1f26c9e7ff56f0d3e0a28d6cf8ce.bin

    • Size

      1.5MB

    • MD5

      44e83dd5257260cf5c9e85100c016116

    • SHA1

      22dc9c4250b9fdb837573308b3a2a6755f9d4b36

    • SHA256

      6153966e76e62c9a812601469553a291f1bc1f26c9e7ff56f0d3e0a28d6cf8ce

    • SHA512

      3cf9e9fa46a669bcc996c9b58883108bc463e0a3e73aeeb53387ec17c579fc8b18ac18c55201255571a5d853c4cf77943d4e38752091753fb6abc9df99f323ed

    • SSDEEP

      24576:a7caN4hTiPRj7yphSSVxBLTDWXXaZODZH7mqNThUIHAE4KvAS1Q:aoaETgy//VnnWXKZGZbmqhqIHAE4KoSW

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks