General

  • Target

    d8fd75875ae68f3283abfc427d930475d7d7c49d233099fa34d8da2ac4ca5aaa.bin

  • Size

    4.8MB

  • Sample

    241018-1y82masfqk

  • MD5

    8ce597aa924a69be076c3e80c1078ec3

  • SHA1

    8c7a8abf8fa7df970fe69b0c2737022b06081c89

  • SHA256

    d8fd75875ae68f3283abfc427d930475d7d7c49d233099fa34d8da2ac4ca5aaa

  • SHA512

    283464c6cf4a6582fdd5f0f925656d0aef2cb6dc6795b43dea5c66c792fc284f43804eb6a2f122c2228f32b8b1f23c18f2fa3abb7b904fa4d0ce25dfe541ad88

  • SSDEEP

    49152:ef1RsEXNUKiAj7s45iS7xrGvvxISXejVKScVIkLzudfMbZ2fIVxtfBQSw:WRsjjAj7l5iSRGb4VKUNhc6IrvLw

Malware Config

Extracted

Family

octo

C2

https://dc251993af25a538edcfde3314f113b5.uk

https://ea68f2cb8ca8f82bde09bd80981e1a07.com

https://a83b690fac7dccc02309b7d13f9de366.ir

https://a084b73e9a70a403de6c4d5dea116a19.ua

https://e7c6e3d510095c54f39b3d28bc6dd5f0.de

https://416095e278218f487bdba99c063f05cc.ca

https://677b5f5442b402adfa1f7b8f8836fe29.net

https://5bc787403eb63cfe126c949b2e6f357f.us

https://beb64a8878217adeada04f5fb999af81.in

https://205326e1539a166bf36e17b87972f45b.info

https://e94608a9f8b8610ae0322374f86de971.au

https://bb7d3436e306f5151546bae190ee1898.org

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      d8fd75875ae68f3283abfc427d930475d7d7c49d233099fa34d8da2ac4ca5aaa.bin

    • Size

      4.8MB

    • MD5

      8ce597aa924a69be076c3e80c1078ec3

    • SHA1

      8c7a8abf8fa7df970fe69b0c2737022b06081c89

    • SHA256

      d8fd75875ae68f3283abfc427d930475d7d7c49d233099fa34d8da2ac4ca5aaa

    • SHA512

      283464c6cf4a6582fdd5f0f925656d0aef2cb6dc6795b43dea5c66c792fc284f43804eb6a2f122c2228f32b8b1f23c18f2fa3abb7b904fa4d0ce25dfe541ad88

    • SSDEEP

      49152:ef1RsEXNUKiAj7s45iS7xrGvvxISXejVKScVIkLzudfMbZ2fIVxtfBQSw:WRsjjAj7l5iSRGb4VKUNhc6IrvLw

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks