General

  • Target

    155abf189db627d066146711569e00c4d5287636725272e4399dff19d35e4973

  • Size

    9.6MB

  • Sample

    241009-jydr2s1ble

  • MD5

    6f365688d2f9ab5c86a10ec1a662a649

  • SHA1

    a81fd7e1b0e43832c595283a59b64f3868befce5

  • SHA256

    155abf189db627d066146711569e00c4d5287636725272e4399dff19d35e4973

  • SHA512

    872488bfa7d03ca1a22fc934cb24e92e4093ed121c295cf905891e5f3593f29fc1999c632da49ceb1c4ee579813bb90101e9a5dea79de94679ee93f1e67756c6

  • SSDEEP

    98304:W61RCpdV2lLPPXl5iSRGLrsF0HSTVZRsU5pl2j75VKlLMmYxevCLJeNe6yS:tXlrTF3Rfp8j75UDYo

Malware Config

Extracted

Family

octo

AES_key
AES_key

Targets

    • Target

      155abf189db627d066146711569e00c4d5287636725272e4399dff19d35e4973

    • Size

      9.6MB

    • MD5

      6f365688d2f9ab5c86a10ec1a662a649

    • SHA1

      a81fd7e1b0e43832c595283a59b64f3868befce5

    • SHA256

      155abf189db627d066146711569e00c4d5287636725272e4399dff19d35e4973

    • SHA512

      872488bfa7d03ca1a22fc934cb24e92e4093ed121c295cf905891e5f3593f29fc1999c632da49ceb1c4ee579813bb90101e9a5dea79de94679ee93f1e67756c6

    • SSDEEP

      98304:W61RCpdV2lLPPXl5iSRGLrsF0HSTVZRsU5pl2j75VKlLMmYxevCLJeNe6yS:tXlrTF3Rfp8j75UDYo

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks