General

  • Target

    117aa133d19ea84a4de87128f16384ae0477f3ee9dd3e43037e102d7039c79d9

  • Size

    8.5MB

  • Sample

    241008-gspk9awdle

  • MD5

    11cb1b221952268fcd6000e563752d79

  • SHA1

    d4a85997999a975848b60fd52597538baf652daf

  • SHA256

    117aa133d19ea84a4de87128f16384ae0477f3ee9dd3e43037e102d7039c79d9

  • SHA512

    906aad7d4aed6a17a11e2cf6908df2613cfc45afc9671736f9cfc1747901006de0048b60f9adba4ea2d57da4738ba7f8950a4f2b1fa4c8959053f2f7d1321178

  • SSDEEP

    98304:P/8A04qRspndZknU+bU5iSRGAMVK15Gy3XQME7+Sz01FtrJQwwCfl:3X0NR1U+wrKUTv3XWDg1T9Q5W

Malware Config

Extracted

Family

octo

C2

https://e8009e84c92eeeb6f2cd34622a9bda07.com

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      117aa133d19ea84a4de87128f16384ae0477f3ee9dd3e43037e102d7039c79d9

    • Size

      8.5MB

    • MD5

      11cb1b221952268fcd6000e563752d79

    • SHA1

      d4a85997999a975848b60fd52597538baf652daf

    • SHA256

      117aa133d19ea84a4de87128f16384ae0477f3ee9dd3e43037e102d7039c79d9

    • SHA512

      906aad7d4aed6a17a11e2cf6908df2613cfc45afc9671736f9cfc1747901006de0048b60f9adba4ea2d57da4738ba7f8950a4f2b1fa4c8959053f2f7d1321178

    • SSDEEP

      98304:P/8A04qRspndZknU+bU5iSRGAMVK15Gy3XQME7+Sz01FtrJQwwCfl:3X0NR1U+wrKUTv3XWDg1T9Q5W

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks