General

  • Target

    3097245af13e654937d04f6ce539f2242c67a50f09d5e14beb774ac28a6e7ced.bin

  • Size

    557KB

  • Sample

    241020-1y9cdssfkb

  • MD5

    75cbe73d1ae3357191da259e67e57bd5

  • SHA1

    29829ebc4f6f74a876ccfdd8c7b85cd7af274e36

  • SHA256

    3097245af13e654937d04f6ce539f2242c67a50f09d5e14beb774ac28a6e7ced

  • SHA512

    a3f4c80b92375152763519caf38d75fa18eb7e9c0a5d91f6479a2d45520e5e4e71bd083130905de6409ba551aff0d6060825a01f1911ef9223e6985986b03a7f

  • SSDEEP

    12288:fkKcDxXlwdjzyq6dgDpwKUWMmWQJVnJx3c4/70g1dSohbF0EutQ:fkKcFX8t+9mW0VnJxMAphF0Et

Malware Config

Extracted

Family

octo

C2

https://2pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://3pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://4pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://5pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://6pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://22pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://32pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://52pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

rc4.plain

Extracted

Family

octo

C2

https://2pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://3pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://4pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://5pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://6pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://22pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://32pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

https://52pethsop332.com/MzQ1Yzk1ZGQ4ODY3/

AES_key

Targets

    • Target

      3097245af13e654937d04f6ce539f2242c67a50f09d5e14beb774ac28a6e7ced.bin

    • Size

      557KB

    • MD5

      75cbe73d1ae3357191da259e67e57bd5

    • SHA1

      29829ebc4f6f74a876ccfdd8c7b85cd7af274e36

    • SHA256

      3097245af13e654937d04f6ce539f2242c67a50f09d5e14beb774ac28a6e7ced

    • SHA512

      a3f4c80b92375152763519caf38d75fa18eb7e9c0a5d91f6479a2d45520e5e4e71bd083130905de6409ba551aff0d6060825a01f1911ef9223e6985986b03a7f

    • SSDEEP

      12288:fkKcDxXlwdjzyq6dgDpwKUWMmWQJVnJx3c4/70g1dSohbF0EutQ:fkKcFX8t+9mW0VnJxMAphF0Et

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks