General

  • Target

    8368ddafcf8a59db7869dc8297526f8a84ffa20e4dc42eb92fde1839398e1830

  • Size

    8.3MB

  • Sample

    241009-j2gm4sxbml

  • MD5

    02daaceca7310f2deacac33be731e27f

  • SHA1

    a3db75e35201a5aa2492c52d651366b29fdf7985

  • SHA256

    8368ddafcf8a59db7869dc8297526f8a84ffa20e4dc42eb92fde1839398e1830

  • SHA512

    cd658c487c8f296b02d9052465b646e12d565cc83e2fc9ebd0497da7d7ede117840eb17f94500681a9957c125805d5b338467820cb8fd0fc55d1b684804a0a0e

  • SSDEEP

    98304:tNFiBOzBqtfxiUQuVN+VK5RzY3XnRszkRin5iSRGVir/eyS:t7jzBys5gN+U7E3XnRSiwrlDnS

Malware Config

Extracted

Family

octo

AES_key
AES_key

Targets

    • Target

      8368ddafcf8a59db7869dc8297526f8a84ffa20e4dc42eb92fde1839398e1830

    • Size

      8.3MB

    • MD5

      02daaceca7310f2deacac33be731e27f

    • SHA1

      a3db75e35201a5aa2492c52d651366b29fdf7985

    • SHA256

      8368ddafcf8a59db7869dc8297526f8a84ffa20e4dc42eb92fde1839398e1830

    • SHA512

      cd658c487c8f296b02d9052465b646e12d565cc83e2fc9ebd0497da7d7ede117840eb17f94500681a9957c125805d5b338467820cb8fd0fc55d1b684804a0a0e

    • SSDEEP

      98304:tNFiBOzBqtfxiUQuVN+VK5RzY3XnRszkRin5iSRGVir/eyS:t7jzBys5gN+U7E3XnRSiwrlDnS

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks