General

  • Target

    3475d087c22616f9e8c78c50e0c1591225f60a1212eb863679a761e0f38e7bea.bin

  • Size

    4.8MB

  • Sample

    241107-12tfcaskbp

  • MD5

    c8e68dad38bd31d444faa3ed4cb05f20

  • SHA1

    34de03a79599d72cd097b41bbe6901127bcba6d3

  • SHA256

    3475d087c22616f9e8c78c50e0c1591225f60a1212eb863679a761e0f38e7bea

  • SHA512

    652fa20bd8ca22d70f15df96be8c54efd597891aebde43aadf0c54b7c26e2006eb2eb913c1aff426d7a480c4ad62ab2c646525e99ad6a1540b8d40c6735b1860

  • SSDEEP

    49152:z3RsEX803VJjKJ3j7b45iS7xrGzr4uonJ1jVKScNFFLptDcPrdcdjjdj9:zRsnwVJj03j7M5iSRGgvVK1xDmrcjR9

Malware Config

Extracted

Family

octo

C2

https://c9e49415bb52b3e0db9fc320b95e63aa.ir

https://42aeaa2f18fbd7aab361ff7442c19e5a.net

https://8161c8d8e3a28d0a28b8bbef06e11751.ca

https://4e54a9d05ac22b5ba510d8501d3cb73a.ua

https://0ba34225aa78d735a7976d154677b70e.au

https://62b07532ca4b58f66a942e1d2fccf28b.info

https://7184c8b13ea56c14d2556438655a6709.org

https://49d9872691e0b08dd3d0fbd44d10f8e3.com

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      3475d087c22616f9e8c78c50e0c1591225f60a1212eb863679a761e0f38e7bea.bin

    • Size

      4.8MB

    • MD5

      c8e68dad38bd31d444faa3ed4cb05f20

    • SHA1

      34de03a79599d72cd097b41bbe6901127bcba6d3

    • SHA256

      3475d087c22616f9e8c78c50e0c1591225f60a1212eb863679a761e0f38e7bea

    • SHA512

      652fa20bd8ca22d70f15df96be8c54efd597891aebde43aadf0c54b7c26e2006eb2eb913c1aff426d7a480c4ad62ab2c646525e99ad6a1540b8d40c6735b1860

    • SSDEEP

      49152:z3RsEX803VJjKJ3j7b45iS7xrGzr4uonJ1jVKScNFFLptDcPrdcdjjdj9:zRsnwVJj03j7M5iSRGgvVK1xDmrcjR9

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks