General

  • Target

    d06dd5fd86fceb2e29a32fbfcede06aee1621867465df94f1d104aff59ebf7c1.bin

  • Size

    4.8MB

  • Sample

    241029-14kafsslcp

  • MD5

    d404eb1f62bdb78286b37e19886fe0e5

  • SHA1

    c4f6409f0d91015d550179ceb45c0c4a7f7a431d

  • SHA256

    d06dd5fd86fceb2e29a32fbfcede06aee1621867465df94f1d104aff59ebf7c1

  • SHA512

    728dcaff2b0ba29aa8a481c31354c527b0cd41ba04c27b97b6158cedfeb37be8e31f3e881456ceae1cb67f17231047702d790ce927790e1fab326dcdb99ccb67

  • SSDEEP

    49152:NHRsEXLOrLaKdAj7l45iS7xrGeveIaSdzjVKSc7SUzF+NMovsksqjIQ:ZRs5rLaAAj725iSRGYlVKYHmoSqsQ

Malware Config

Extracted

Family

octo

C2

https://bd074baa5ebc88b5a6f03b616c87246e.com

https://78bfdf7903b7cc4d4da07516e92963b3.au

https://5e48be114151237ed5f85315ae950951.uk

https://f89bb4112a1ed2e052c9a43985cd298e.net

https://5dd235fbe21de8cfe12e645e7df92c90.org

https://d6adb4032af756c7954f87a0dba317fe.in

https://ea60d4812369416933bbe1bede598d57.ir

https://deff69bd3718b77f2bf9d50ab45ada3d.ua

https://5b425abaf8fe89f352106b85381ba421.ca

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      d06dd5fd86fceb2e29a32fbfcede06aee1621867465df94f1d104aff59ebf7c1.bin

    • Size

      4.8MB

    • MD5

      d404eb1f62bdb78286b37e19886fe0e5

    • SHA1

      c4f6409f0d91015d550179ceb45c0c4a7f7a431d

    • SHA256

      d06dd5fd86fceb2e29a32fbfcede06aee1621867465df94f1d104aff59ebf7c1

    • SHA512

      728dcaff2b0ba29aa8a481c31354c527b0cd41ba04c27b97b6158cedfeb37be8e31f3e881456ceae1cb67f17231047702d790ce927790e1fab326dcdb99ccb67

    • SSDEEP

      49152:NHRsEXLOrLaKdAj7l45iS7xrGeveIaSdzjVKSc7SUzF+NMovsksqjIQ:ZRs5rLaAAj725iSRGYlVKYHmoSqsQ

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks