General

  • Target

    fb89781aa16684ac9ebe258e78f9f01b44415506b1429a6968716b81df10c8ad.bin

  • Size

    1.0MB

  • Sample

    240908-19b62a1aqh

  • MD5

    5778510c96b0c2393406a9c10e037532

  • SHA1

    d4ebef2ad37349ec455d49ea582586246b633958

  • SHA256

    fb89781aa16684ac9ebe258e78f9f01b44415506b1429a6968716b81df10c8ad

  • SHA512

    c9a1a3b66ecc0ccedc0bba4344d0219f98c4a8eddae9c70feeebe700979f24c6612a425b8ce0cd7241858c11b1184ac153b9de9fee12c12c30a2b139f21e4d83

  • SSDEEP

    24576:ceBmODUW2BZBsSGv80UsxTGDzRIYzXVQMgMgGFcLIv8luH6c:ceBmqsZOXlpEqMKGFcLK

Malware Config

Extracted

Family

octo

C2

https://elifbutikeri.xyz/NzljODA0ODUyYzRi/

https://sanatvetasarimdunyasi.xyz/NzljODA0ODUyYzRi/

https://teknolojivegelecek.xyz/NzljODA0ODUyYzRi/

https://evdeyemektarifleri.xyz/NzljODA0ODUyYzRi/

https://dogayagezirehberi.xyz/NzljODA0ODUyYzRi/

https://cocukvetatilplanlari.xyz/NzljODA0ODUyYzRi/

https://kitapseverlerklubu.xyz/NzljODA0ODUyYzRi/

https://oyuncakdunyasi.xyz/NzljODA0ODUyYzRi/

https://bilimgelistirme.xyz/NzljODA0ODUyYzRi/

https://akillitelefonrehberi.xyz/NzljODA0ODUyYzRi/

https://sanatvesanatcilar.xyz/NzljODA0ODUyYzRi/

https://kulturvesanatgezileri.xyz/NzljODA0ODUyYzRi/

https://geziyorumdunyayi.xyz/NzljODA0ODUyYzRi/

https://tariharastirmalari.xyz/NzljODA0ODUyYzRi/

https://teknolojininbuyusu.xyz/NzljODA0ODUyYzRi/

https://bilgisayardestegi.xyz/NzljODA0ODUyYzRi/

https://internettenparakazan.xyz/NzljODA0ODUyYzRi/

https://modagezginleri.xyz/NzljODA0ODUyYzRi/

https://hayalinizdekiyasam.xyz/NzljODA0ODUyYzRi/

https://modernsanatseverler.xyz/NzljODA0ODUyYzRi/

rc4.plain

Extracted

Family

octo

C2

https://elifbutikeri.xyz/NzljODA0ODUyYzRi/

https://sanatvetasarimdunyasi.xyz/NzljODA0ODUyYzRi/

https://teknolojivegelecek.xyz/NzljODA0ODUyYzRi/

https://evdeyemektarifleri.xyz/NzljODA0ODUyYzRi/

https://dogayagezirehberi.xyz/NzljODA0ODUyYzRi/

https://cocukvetatilplanlari.xyz/NzljODA0ODUyYzRi/

https://kitapseverlerklubu.xyz/NzljODA0ODUyYzRi/

https://oyuncakdunyasi.xyz/NzljODA0ODUyYzRi/

https://bilimgelistirme.xyz/NzljODA0ODUyYzRi/

https://akillitelefonrehberi.xyz/NzljODA0ODUyYzRi/

https://sanatvesanatcilar.xyz/NzljODA0ODUyYzRi/

https://kulturvesanatgezileri.xyz/NzljODA0ODUyYzRi/

https://geziyorumdunyayi.xyz/NzljODA0ODUyYzRi/

https://tariharastirmalari.xyz/NzljODA0ODUyYzRi/

https://teknolojininbuyusu.xyz/NzljODA0ODUyYzRi/

https://bilgisayardestegi.xyz/NzljODA0ODUyYzRi/

https://internettenparakazan.xyz/NzljODA0ODUyYzRi/

https://modagezginleri.xyz/NzljODA0ODUyYzRi/

https://hayalinizdekiyasam.xyz/NzljODA0ODUyYzRi/

https://modernsanatseverler.xyz/NzljODA0ODUyYzRi/

AES_key

Targets

    • Target

      fb89781aa16684ac9ebe258e78f9f01b44415506b1429a6968716b81df10c8ad.bin

    • Size

      1.0MB

    • MD5

      5778510c96b0c2393406a9c10e037532

    • SHA1

      d4ebef2ad37349ec455d49ea582586246b633958

    • SHA256

      fb89781aa16684ac9ebe258e78f9f01b44415506b1429a6968716b81df10c8ad

    • SHA512

      c9a1a3b66ecc0ccedc0bba4344d0219f98c4a8eddae9c70feeebe700979f24c6612a425b8ce0cd7241858c11b1184ac153b9de9fee12c12c30a2b139f21e4d83

    • SSDEEP

      24576:ceBmODUW2BZBsSGv80UsxTGDzRIYzXVQMgMgGFcLIv8luH6c:ceBmqsZOXlpEqMKGFcLK

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks