General

  • Target

    fe174c98d9d231b91ae159fc54db048efbab5b9cbb7e8b2f1c015b3a4c2abe7a

  • Size

    9.5MB

  • Sample

    241028-s7h8kashpp

  • MD5

    effc0c4df2687163b906947c7d1edcfa

  • SHA1

    a159f22b3f2dcc9b4610f3a5f22faf3eed5b7bad

  • SHA256

    fe174c98d9d231b91ae159fc54db048efbab5b9cbb7e8b2f1c015b3a4c2abe7a

  • SHA512

    e24290f81f59f8aa98de8739d2d277a14dcd3e3290a95c721b5bfc3b883d28262d5d583c104d0d62616bfa14ec4fd63959041c4abbc22bd8ffa301140c1a1c9a

  • SSDEEP

    98304:qMVUxnVKaPYm3Xc5iSRGBtRsUIacFoUHawHkhUacLQ539bCVSkBl:qMC1Ug53XcrARnITCU6FCVBl

Malware Config

Extracted

Family

octo

C2

https://775f953213e72f9498cb3dc26e7d5ba8.xyz

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      fe174c98d9d231b91ae159fc54db048efbab5b9cbb7e8b2f1c015b3a4c2abe7a

    • Size

      9.5MB

    • MD5

      effc0c4df2687163b906947c7d1edcfa

    • SHA1

      a159f22b3f2dcc9b4610f3a5f22faf3eed5b7bad

    • SHA256

      fe174c98d9d231b91ae159fc54db048efbab5b9cbb7e8b2f1c015b3a4c2abe7a

    • SHA512

      e24290f81f59f8aa98de8739d2d277a14dcd3e3290a95c721b5bfc3b883d28262d5d583c104d0d62616bfa14ec4fd63959041c4abbc22bd8ffa301140c1a1c9a

    • SSDEEP

      98304:qMVUxnVKaPYm3Xc5iSRGBtRsUIacFoUHawHkhUacLQ539bCVSkBl:qMC1Ug53XcrARnITCU6FCVBl

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks