General

  • Target

    10a9ce1de1cc0bfc6372b91572e82368eac23dc3a85bfe0e58c84e8b6686582e.bin

  • Size

    4.8MB

  • Sample

    241015-1zpdlszbpd

  • MD5

    3897e4a739b3ed715733ae7d1d00a17a

  • SHA1

    1748e3b5b152cf1ab8ed18ecda7e10d361534094

  • SHA256

    10a9ce1de1cc0bfc6372b91572e82368eac23dc3a85bfe0e58c84e8b6686582e

  • SHA512

    d8cbd9e6ff237a5b357e923efe492b88f57e35e1c56760cc380d12dc1e54ec7b3c8057152ec972150cf7747a23f1aa7fa9d59cc75febb2521596b7e3c5834317

  • SSDEEP

    49152:gCJRsEX+JKcbj7G45iS7xrG8ZJElZgjVKScUEUTnyDKY2OnPn+FNeMpi:PRsPpbj7H5iSRGd+VKL9D1mFEMpi

Malware Config

Extracted

Family

octo

C2

https://677b5f5442b402adfa1f7b8f8836fe29.net

https://e7c6e3d510095c54f39b3d28bc6dd5f0.de

https://416095e278218f487bdba99c063f05cc.ca

https://bb7d3436e306f5151546bae190ee1898.org

https://e94608a9f8b8610ae0322374f86de971.au

https://205326e1539a166bf36e17b87972f45b.info

https://beb64a8878217adeada04f5fb999af81.in

https://a83b690fac7dccc02309b7d13f9de366.ir

https://a084b73e9a70a403de6c4d5dea116a19.ua

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      10a9ce1de1cc0bfc6372b91572e82368eac23dc3a85bfe0e58c84e8b6686582e.bin

    • Size

      4.8MB

    • MD5

      3897e4a739b3ed715733ae7d1d00a17a

    • SHA1

      1748e3b5b152cf1ab8ed18ecda7e10d361534094

    • SHA256

      10a9ce1de1cc0bfc6372b91572e82368eac23dc3a85bfe0e58c84e8b6686582e

    • SHA512

      d8cbd9e6ff237a5b357e923efe492b88f57e35e1c56760cc380d12dc1e54ec7b3c8057152ec972150cf7747a23f1aa7fa9d59cc75febb2521596b7e3c5834317

    • SSDEEP

      49152:gCJRsEX+JKcbj7G45iS7xrG8ZJElZgjVKScUEUTnyDKY2OnPn+FNeMpi:PRsPpbj7H5iSRGd+VKL9D1mFEMpi

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks