General

  • Target

    1.traff23_com.useallrb_Lazada_0_crypt_aligned.apk

  • Size

    1.9MB

  • Sample

    230927-y5s8mseb4y

  • MD5

    6552b0699c6683b9a7d905d431b14403

  • SHA1

    a40c6bb1990ce78414b64bf9a2f6225e6012ee8e

  • SHA256

    5ebac20a82963408b103b0e53da63fc22a15404321989a090505ee8258095423

  • SHA512

    e488030c5d39ea668f8d8e4b799ce34f54eb2ecd34d1e5c36d88293137d58997bb674533d6be880cd9703ae2c6d5622d521ca8a2194e21dbc7c112f471896834

  • SSDEEP

    24576:MmlR3LHA9i1J6hf+SsmW+c92P4J1dMZAMm7tAme4Z/w5gNlVYRDlYqjaOB04IB3+:zLA816famWaP4yY5RZ/wytEieLRfbfV

Malware Config

Extracted

Family

octo

C2

https://cm603lzeyxdw.site/MTU2OWE0NzJjNGY5/

https://cm603lzeyxdw1.site/MTU2OWE0NzJjNGY5/

https://arw2he7x57wp.pw/MTU2OWE0NzJjNGY5/

https://5a9udxg6l6gd.su/MTU2OWE0NzJjNGY5/

https://9r8i1u84t2gp.online/MTU2OWE0NzJjNGY5/

https://cm603lzeyxdw.space/MTU2OWE0NzJjNGY5/

https://cleverk21da912mca.live/MTU2OWE0NzJjNGY5/

https://zazarazgok7215vor1.pro/MTU2OWE0NzJjNGY5/

https://juf18ki1ca15ca1la.info/MTU2OWE0NzJjNGY5/

AES_key

Targets

    • Target

      1.traff23_com.useallrb_Lazada_0_crypt_aligned.apk

    • Size

      1.9MB

    • MD5

      6552b0699c6683b9a7d905d431b14403

    • SHA1

      a40c6bb1990ce78414b64bf9a2f6225e6012ee8e

    • SHA256

      5ebac20a82963408b103b0e53da63fc22a15404321989a090505ee8258095423

    • SHA512

      e488030c5d39ea668f8d8e4b799ce34f54eb2ecd34d1e5c36d88293137d58997bb674533d6be880cd9703ae2c6d5622d521ca8a2194e21dbc7c112f471896834

    • SSDEEP

      24576:MmlR3LHA9i1J6hf+SsmW+c92P4J1dMZAMm7tAme4Z/w5gNlVYRDlYqjaOB04IB3+:zLA816famWaP4yY5RZ/wytEieLRfbfV

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks