General

  • Target

    19605d10876e75e584278116e31b97832c6348054c2505ae9a2aa77a3135aef6

  • Size

    9.1MB

  • Sample

    241127-3dlrpsvpfz

  • MD5

    814d41046b902f963076fcec5b11c686

  • SHA1

    494544386347dc8db10c16baecd7e9f9c98f9deb

  • SHA256

    19605d10876e75e584278116e31b97832c6348054c2505ae9a2aa77a3135aef6

  • SHA512

    7fc3322cc054b91fa26e4b70b4b732670a6abd73b269ef8168b58fa85e00c41c865617c0e6388e12338c11a4ebf97a70bba39439416cc8e0ce26b16d234084f1

  • SSDEEP

    196608:jnFV2/ZVktqJcfTrh6Q0vIrxfAfsNUxRGooPAoXlY4x38p709VBN:jFgxyYJcf/wQ0wQxYdPA8hx3cQb

Malware Config

Extracted

Family

octo

C2

https://156350786312d7feba2b1c9b7577097b.com

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      19605d10876e75e584278116e31b97832c6348054c2505ae9a2aa77a3135aef6

    • Size

      9.1MB

    • MD5

      814d41046b902f963076fcec5b11c686

    • SHA1

      494544386347dc8db10c16baecd7e9f9c98f9deb

    • SHA256

      19605d10876e75e584278116e31b97832c6348054c2505ae9a2aa77a3135aef6

    • SHA512

      7fc3322cc054b91fa26e4b70b4b732670a6abd73b269ef8168b58fa85e00c41c865617c0e6388e12338c11a4ebf97a70bba39439416cc8e0ce26b16d234084f1

    • SSDEEP

      196608:jnFV2/ZVktqJcfTrh6Q0vIrxfAfsNUxRGooPAoXlY4x38p709VBN:jFgxyYJcf/wQ0wQxYdPA8hx3cQb

    • Target

      base.apk

    • Size

      7.2MB

    • MD5

      29ee1a7d83cdc7067a78f810e7b91b2c

    • SHA1

      b26b7f39d151fe1ef62591934f3024e326dc81e4

    • SHA256

      d7c65afe1247656d7c75adae815b13bd0adbca536321729651ccbcdc6a3df511

    • SHA512

      31ecc151c44c68616024c0ac029ec1f3c71a1466b637033dbc531027b29fe3abc457e83f119865806574d7297d051cb8ba08448d0b30042f57847658ccfc3acf

    • SSDEEP

      98304:oxPK78Kj7URsLyTuIeNeBKV25iSRGsEVK37ozxhh:sS7Bj7URTTu09r6Urozx

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks