General

  • Target

    9f487b4aa1971832071d246adede473844635b5e4a1aa20dd6930ff4053b7a0d.bin

  • Size

    4.8MB

  • Sample

    241104-1wpj7syanf

  • MD5

    ee585fadd0ed2f786da3b9866c6a35aa

  • SHA1

    ca25bd8100608e90a7f2aff69a60360114ab1fce

  • SHA256

    9f487b4aa1971832071d246adede473844635b5e4a1aa20dd6930ff4053b7a0d

  • SHA512

    2af1e839298fcabc8c36a86052869482701743638b6dc940dc9a0fc65f16dba60182b7d834cd6b8dacf141726e8142d864da65dfe0a2bf7b52cd0f36695e8e2e

  • SSDEEP

    49152:2RRsEXD0AmmbK3/j7T45iS7xrGU/p850tqjVKScm17Qcn7c0NfCKGhNJ:ERsgvmES/j7U5iSRGe2VKUZc0JvGhNJ

Malware Config

Extracted

Family

octo

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      9f487b4aa1971832071d246adede473844635b5e4a1aa20dd6930ff4053b7a0d.bin

    • Size

      4.8MB

    • MD5

      ee585fadd0ed2f786da3b9866c6a35aa

    • SHA1

      ca25bd8100608e90a7f2aff69a60360114ab1fce

    • SHA256

      9f487b4aa1971832071d246adede473844635b5e4a1aa20dd6930ff4053b7a0d

    • SHA512

      2af1e839298fcabc8c36a86052869482701743638b6dc940dc9a0fc65f16dba60182b7d834cd6b8dacf141726e8142d864da65dfe0a2bf7b52cd0f36695e8e2e

    • SSDEEP

      49152:2RRsEXD0AmmbK3/j7T45iS7xrGU/p850tqjVKScm17Qcn7c0NfCKGhNJ:ERsgvmES/j7U5iSRGe2VKUZc0JvGhNJ

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks