General

  • Target

    521f4567d1b7cd932be680dc591507f4200ed35c8d802a0cee34d6a97c2c8699.bin

  • Size

    541KB

  • Sample

    240531-18fg3agc86

  • MD5

    ef3702092973af477599a7962ec34bbd

  • SHA1

    310f825591a825a25b9611d32440537836e00c37

  • SHA256

    521f4567d1b7cd932be680dc591507f4200ed35c8d802a0cee34d6a97c2c8699

  • SHA512

    1e5ccfbb54abd6c12caf09da7b3fdd3bc70ebfcc0dda2763aafc9545449b25c91ad1b6d1b34ab7d1457d112fe6d4268da92470617eea2e8ea9bbec9ad22f6d4d

  • SSDEEP

    12288:v8JJ9jWvAPNb9xUNSvuk6Lk4fKzSvJIKogQOIbkAZZ2/Wnd:v8JJ9jWvE9sG2LkhSvvPHIbkA2/Wnd

Malware Config

Extracted

Family

octo

C2

https://moneyeuroland.net/MmI1M2ZiMGRmODEy/

https://moneyeurolandbebek.net/MmI1M2ZiMGRmODEy/

https://moneyeurolandscans.net/MmI1M2ZiMGRmODEy/

https://moneyeurolanddelicim.net/MmI1M2ZiMGRmODEy/

https://moneyeurolandbabis.net/MmI1M2ZiMGRmODEy/

https://moeurolandbabisde.net/MmI1M2ZiMGRmODEy/

https://eyeurolandbabisce.net/MmI1M2ZiMGRmODEy/

https://morolandbabisge.net/MmI1M2ZiMGRmODEy/

AES_key

Targets

    • Target

      521f4567d1b7cd932be680dc591507f4200ed35c8d802a0cee34d6a97c2c8699.bin

    • Size

      541KB

    • MD5

      ef3702092973af477599a7962ec34bbd

    • SHA1

      310f825591a825a25b9611d32440537836e00c37

    • SHA256

      521f4567d1b7cd932be680dc591507f4200ed35c8d802a0cee34d6a97c2c8699

    • SHA512

      1e5ccfbb54abd6c12caf09da7b3fdd3bc70ebfcc0dda2763aafc9545449b25c91ad1b6d1b34ab7d1457d112fe6d4268da92470617eea2e8ea9bbec9ad22f6d4d

    • SSDEEP

      12288:v8JJ9jWvAPNb9xUNSvuk6Lk4fKzSvJIKogQOIbkAZZ2/Wnd:v8JJ9jWvE9sG2LkhSvvPHIbkA2/Wnd

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Prevents application removal

      Application may abuse the framework's APIs to prevent removal.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests modifying system settings.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks