General

  • Target

    d84dd7907277446189ab6a740e808066c684734b8df51ad825152c2cb977dc25.bin

  • Size

    4.8MB

  • Sample

    241107-14pj6szapm

  • MD5

    b80f92f565db51f8bdfc52f988297b77

  • SHA1

    a4c6e11ee47c5163575f58c26c8c7b4e260dfbba

  • SHA256

    d84dd7907277446189ab6a740e808066c684734b8df51ad825152c2cb977dc25

  • SHA512

    ad25a0265294347bbd957e1bba1e631d13af27e8e107ba97d29bb90b1e89f2d6b3078cd2f5a5114d2d42d870f305b19d736b98a3eafeb558eedd77f8afca13de

  • SSDEEP

    49152:eRsEXWZfoCK/mj7M45iS7xrGVrliSUyRjVKScnsEG52tbwqqgKerCyrNJkpUk:eRsHACGmj7F5iSRGM2VK7tsqDKj4Dk

Malware Config

Extracted

Family

octo

C2

https://973d88804709322c64d691582165ac21.de

https://3c855c9e306502817049486840cd759e.net

https://6fd1a7eb4e86a9c8185822a221fae5fa.org

https://58ea9c4207bba609be42d0a02c4a5e0c.ua

https://dddddf72b264466425e722861a41a566.uk

https://9df021b1da0da6e36e96a21a5ad8e958.us

https://a70eb32cb1992e3db80e2343303c6eb2.info

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      d84dd7907277446189ab6a740e808066c684734b8df51ad825152c2cb977dc25.bin

    • Size

      4.8MB

    • MD5

      b80f92f565db51f8bdfc52f988297b77

    • SHA1

      a4c6e11ee47c5163575f58c26c8c7b4e260dfbba

    • SHA256

      d84dd7907277446189ab6a740e808066c684734b8df51ad825152c2cb977dc25

    • SHA512

      ad25a0265294347bbd957e1bba1e631d13af27e8e107ba97d29bb90b1e89f2d6b3078cd2f5a5114d2d42d870f305b19d736b98a3eafeb558eedd77f8afca13de

    • SSDEEP

      49152:eRsEXWZfoCK/mj7M45iS7xrGVrliSUyRjVKScnsEG52tbwqqgKerCyrNJkpUk:eRsHACGmj7F5iSRGM2VK7tsqDKj4Dk

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks