Resubmissions

08-10-2024 05:42

241008-gedlts1hmk 10

07-10-2024 10:22

241007-mej2haterc 10

04-10-2024 17:46

241004-wch6vs1hqf 10

04-10-2024 14:54

241004-r943dathlb 10

04-10-2024 05:32

241004-f8fsls1cqe 10

General

  • Target

    11c67c555c1ba93694cca7c15aefca46faad7db63f0c3e0dc52c103ca435d30a

  • Size

    4.8MB

  • Sample

    241004-r943dathlb

  • MD5

    557d3b324e38e97004125d73e3c265bf

  • SHA1

    c142025f6e058a2691fd21607e66fed61ac91b3a

  • SHA256

    11c67c555c1ba93694cca7c15aefca46faad7db63f0c3e0dc52c103ca435d30a

  • SHA512

    37c33b04c3b8f7bca9f2b2ded649d7740b08bc6adff0226d654938ca9782f621dba0baf4468bc32fc0f3a5c40efac0ff32e086180aadaa2067d39bc50a350f72

  • SSDEEP

    49152:HRsEX9rGbtKooj7s45iS7xrGPGO7ttTjVKScjPYFogGMYRCOSa+C:HRs+CtFoj7l5iSRG7vVKtEG4E1

Malware Config

Extracted

Family

octo

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      11c67c555c1ba93694cca7c15aefca46faad7db63f0c3e0dc52c103ca435d30a

    • Size

      4.8MB

    • MD5

      557d3b324e38e97004125d73e3c265bf

    • SHA1

      c142025f6e058a2691fd21607e66fed61ac91b3a

    • SHA256

      11c67c555c1ba93694cca7c15aefca46faad7db63f0c3e0dc52c103ca435d30a

    • SHA512

      37c33b04c3b8f7bca9f2b2ded649d7740b08bc6adff0226d654938ca9782f621dba0baf4468bc32fc0f3a5c40efac0ff32e086180aadaa2067d39bc50a350f72

    • SSDEEP

      49152:HRsEX9rGbtKooj7s45iS7xrGPGO7ttTjVKScjPYFogGMYRCOSa+C:HRs+CtFoj7l5iSRG7vVKtEG4E1

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks