Resubmissions

01-11-2023 09:31

231101-lhg6msge72 10

28-09-2023 09:21

230928-lbbehsaa8t 10

General

  • Target

    4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4

  • Size

    1.7MB

  • Sample

    230928-lbbehsaa8t

  • MD5

    d66860f4fbd02fdbc452b9e3fabdfe71

  • SHA1

    332c7fa9260426e33e60ff5619ba2dbf630c60e8

  • SHA256

    4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4

  • SHA512

    56c7025c23af5eb43a3db8f848f477d8b05d4dd68d86e3bb39756ef701202cc9a53645bb022741491efb8347513db10743f88aef6e1e2862d0ca9265d231abab

  • SSDEEP

    49152:g7meK0meZdvS1S8ApovsEY1xMjhSDCaEA3DI:cmeZmUAXAoYkNwCaz3DI

Malware Config

Extracted

Family

octo

C2

https://daniel.osborne.chickenkiller.com/YjJjM2M0NDc4ZjBj/

https://laural-plath.chickenkiller.com/YjJjM2M0NDc4ZjBj/

https://gabriela.saunders.crabdance.com/YjJjM2M0NDc4ZjBj/

https://James-beekman.jumpingcrab.com/YjJjM2M0NDc4ZjBj/

https://brian-tallman.twilightparadox.com/YjJjM2M0NDc4ZjBj/

AES_key

Targets

    • Target

      4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4

    • Size

      1.7MB

    • MD5

      d66860f4fbd02fdbc452b9e3fabdfe71

    • SHA1

      332c7fa9260426e33e60ff5619ba2dbf630c60e8

    • SHA256

      4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4

    • SHA512

      56c7025c23af5eb43a3db8f848f477d8b05d4dd68d86e3bb39756ef701202cc9a53645bb022741491efb8347513db10743f88aef6e1e2862d0ca9265d231abab

    • SSDEEP

      49152:g7meK0meZdvS1S8ApovsEY1xMjhSDCaEA3DI:cmeZmUAXAoYkNwCaz3DI

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks