General

  • Target

    ebf146781a6b0d52c18ff72957eee3f5116c005111716596452654a75fefa11b

  • Size

    8.0MB

  • Sample

    241028-sspf2azpet

  • MD5

    37073a351c8aaa6a4e51db8f18b04f48

  • SHA1

    17466f7e8b194777519a3add039d9c3ba9c4deb9

  • SHA256

    ebf146781a6b0d52c18ff72957eee3f5116c005111716596452654a75fefa11b

  • SHA512

    60397381b6413b16323fd961f9f47f0c9d6235088f03c7d9ee1caae3f7ac06aceaa56e44f842e06a1dd4ab52de050a9592cea1503f1971bfc13c19aa16d6698b

  • SSDEEP

    98304:/MX33l7UU3SIdbc5iSRG77RsLOdC3XKVKRTvPkeNeW7:0X33lh3SmcrgR103XKUZv7

Malware Config

Extracted

Family

octo

C2

https://839f702490ce17a92b6e415b949aabc1.com

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      ebf146781a6b0d52c18ff72957eee3f5116c005111716596452654a75fefa11b

    • Size

      8.0MB

    • MD5

      37073a351c8aaa6a4e51db8f18b04f48

    • SHA1

      17466f7e8b194777519a3add039d9c3ba9c4deb9

    • SHA256

      ebf146781a6b0d52c18ff72957eee3f5116c005111716596452654a75fefa11b

    • SHA512

      60397381b6413b16323fd961f9f47f0c9d6235088f03c7d9ee1caae3f7ac06aceaa56e44f842e06a1dd4ab52de050a9592cea1503f1971bfc13c19aa16d6698b

    • SSDEEP

      98304:/MX33l7UU3SIdbc5iSRG77RsLOdC3XKVKRTvPkeNeW7:0X33lh3SmcrgR103XKUZv7

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks