General

  • Target

    7738dee51252ffab505a9fe4e46ec58d5d87e7f69c0c14677800ab6abc38f997.bin

  • Size

    682KB

  • Sample

    240912-1zxpzsxhrd

  • MD5

    233494696864208fa596645b956fdc4c

  • SHA1

    d81744e305aff5d5e3ad923ff998a009124f843e

  • SHA256

    7738dee51252ffab505a9fe4e46ec58d5d87e7f69c0c14677800ab6abc38f997

  • SHA512

    f1d5c13bc55ea106e60c53b1168a08ec77c08b639177f6094d41a40a854179a1b9b87fb21bf57e77e7e359b5a592a61710303a53e1a12b9fec3d0a35231f6d18

  • SSDEEP

    12288:wMMtanGEA8Us05k2Mw0588tCUPzMuQX4LQHlR0q4wMpHmkQGlyFSt8UCsJx:2anGHs05hFwzMqLaH0SMckQGlKSCUCox

Malware Config

Extracted

Family

octo

C2

https://185.198.69.111/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisplazma.com/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisplazisa.net/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisplazposka.xyz/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisclmzisa.net/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisclmklsa.com/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisclmszcrsi.net/NTBiZmM4ZDQ2MWY2/

rc4.plain

Extracted

Family

octo

C2

https://185.198.69.111/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisplazma.com/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisplazisa.net/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisplazposka.xyz/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisclmzisa.net/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisclmklsa.com/NTBiZmM4ZDQ2MWY2/

https://patsinosmtvszlisclmszcrsi.net/NTBiZmM4ZDQ2MWY2/

AES_key

Targets

    • Target

      base.apk

    • Size

      682KB

    • MD5

      f63d64576f9491ae860cdc9b892f955b

    • SHA1

      50dc18ce87da8b7db8af569127b1dbbaf25d6195

    • SHA256

      0276dd538296412709009818051b73860785d6d52c2358916ba3584ea0b70438

    • SHA512

      33fb06fe7af25c0d5b0341aece42665e1312c7a7bf3d3d654f3bd9103ca53014dbd5353d4e7d44c595a99679d52842bf97d39aa4b238d78e45e676ab8d3b5efe

    • SSDEEP

      12288:aMMtanGEA8Us05k2Mw0588tCUPzMuQX4LQHlR0q4wMpHmkQGlyFSt8UCsJL:AanGHs05hFwzMqLaH0SMckQGlKSCUCoL

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks