General

  • Target

    0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8.bin

  • Size

    541KB

  • Sample

    240602-198j8sab87

  • MD5

    368f347c4a7972eff3604d15f8dce788

  • SHA1

    769ba40c539b97c913020e9dc53581c3429f1eb2

  • SHA256

    0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8

  • SHA512

    dc28328e87b986ad7035007f927da955d4be6120587232a13cac4c76939db7965d63cdbf66b449035c3707c79ae9420696aba64cf4bfdb800e81f0ee588e771f

  • SSDEEP

    12288:Lxd51i8+fdTTahTHvyHNGcdLnwq+tyJ1QuY5kDLW5Y58nx:lCZTCCNJdLnwDApDLFOnx

Malware Config

Extracted

Family

octo

C2

https://maviderinkalem.shop/NzUxNjc3YmZjNTNl/

https://karayipkalanda.shop/NzUxNjc3YmZjNTNl/

https://maviceketler.shop/NzUxNjc3YmZjNTNl/

https://martilarlaaraba.shop/NzUxNjc3YmZjNTNl/

https://kafaneredeciler2.shop/NzUxNjc3YmZjNTNl/

https://mavidlimanda.shop/NzUxNjc3YmZjNTNl/

https://mavidendercam.com/NzUxNjc3YmZjNTNl/

https://mavideritarak2.shop/NzUxNjc3YmZjNTNl/

https://beyazgelinlik12.shop/NzUxNjc3YmZjNTNl/

https://mahmatagada.top/NzUxNjc3YmZjNTNl/

https://maviderinasfkalem1231.shop/NzUxNjc3YmZjNTNl/

https://hadiordangel23.net/NzUxNjc3YmZjNTNl/

https://martilarlaaraba2412.shop/NzUxNjc3YmZjNTNl/

https://kafaneredecilersda2.shop/NzUxNjc3YmZjNTNl/

https://mavidlimanda123.shop/NzUxNjc3YmZjNTNl/

https://mavidendercamlar2.com/NzUxNjc3YmZjNTNl/

AES_key

Targets

    • Target

      0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8.bin

    • Size

      541KB

    • MD5

      368f347c4a7972eff3604d15f8dce788

    • SHA1

      769ba40c539b97c913020e9dc53581c3429f1eb2

    • SHA256

      0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8

    • SHA512

      dc28328e87b986ad7035007f927da955d4be6120587232a13cac4c76939db7965d63cdbf66b449035c3707c79ae9420696aba64cf4bfdb800e81f0ee588e771f

    • SSDEEP

      12288:Lxd51i8+fdTTahTHvyHNGcdLnwq+tyJ1QuY5kDLW5Y58nx:lCZTCCNJdLnwDApDLFOnx

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Prevents application removal

      Application may abuse the framework's APIs to prevent removal.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests modifying system settings.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks