General

  • Target

    71289fd0369a79aaad17e758266214ff5506635d436c1b374ea3db6e56f19f65

  • Size

    8.1MB

  • Sample

    241009-j2rhbaxbpn

  • MD5

    1aa4cced6125d872db24b24765017f09

  • SHA1

    ea56297b918e52967802d88068459675de0189c4

  • SHA256

    71289fd0369a79aaad17e758266214ff5506635d436c1b374ea3db6e56f19f65

  • SHA512

    0272bc43f3b181b3d97dd2fb8714c5e592cd444f61b64b63f47a707e07394c17570e43ec2fa5d7b88f9a8cffeac11a23471abb61ebd0426f669561c0575751c0

  • SSDEEP

    98304:sQPd5iSRGm90f8NNHVKAKHws52uMbbRsUJzNRH3X5:fdrt0fKHUXHws52uMbbRZlNF3X5

Malware Config

Extracted

Family

octo

C2

https://e8009e84c92eeeb6f2cd34622a9bda07.com

AES_key
AES_key

Targets

    • Target

      71289fd0369a79aaad17e758266214ff5506635d436c1b374ea3db6e56f19f65

    • Size

      8.1MB

    • MD5

      1aa4cced6125d872db24b24765017f09

    • SHA1

      ea56297b918e52967802d88068459675de0189c4

    • SHA256

      71289fd0369a79aaad17e758266214ff5506635d436c1b374ea3db6e56f19f65

    • SHA512

      0272bc43f3b181b3d97dd2fb8714c5e592cd444f61b64b63f47a707e07394c17570e43ec2fa5d7b88f9a8cffeac11a23471abb61ebd0426f669561c0575751c0

    • SSDEEP

      98304:sQPd5iSRGm90f8NNHVKAKHws52uMbbRsUJzNRH3X5:fdrt0fKHUXHws52uMbbRZlNF3X5

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks