General

  • Target

    2c853f070e00617ac7f54fc561f3e7e0871a2885fd155fbe92f8af65adf295d5.bin

  • Size

    301KB

  • Sample

    241130-16f1ta1pek

  • MD5

    01ff57f4e471bbadcf202705ce68c04c

  • SHA1

    268c6cd97251a1f0eadc97fa02c48beacb325125

  • SHA256

    2c853f070e00617ac7f54fc561f3e7e0871a2885fd155fbe92f8af65adf295d5

  • SHA512

    a053e63f2aaae01f7235588b52de6a71294f90b9e66540c3e68c805a889a95efca23e28a2a7227a7d40bf7d966bc9ba3f80e5fbf4dbbd595654f878f75b96b18

  • SSDEEP

    6144:Gy76FFgDoDMAKtblM/oqdEH5Fg86Rg0AaJNUireP/EuGD:T7RJNcw5FgPg0RJNJeHny

Malware Config

Extracted

Family

octo

C2

https://androstormxnow.xyz/MTA2MzQzMjEyMzM3/

https://mubarekzamanalsa.xyz/MTA2MzQzMjEyMzM3/

https://esrdinclimarxketxu.xyz/MTA2MzQzMjEyMzM3/

https://tnisvsorupazuxehome.xyz/MTA2MzQzMjEyMzM3/

https://jtsekirvsorsaapumahaxe.xyz/MTA2MzQzMjEyMzM3/

https://loksusnivepasassszuxeko.xyz/MTA2MzQzMjEyMzM3/

https://tisavoraktsstumahozexe.xyz/MTA2MzQzMjEyMzM3/

https://zekurapoymaivssuheno.xyz/MTA2MzQzMjEyMzM3/

AES_key

Targets

    • Target

      2c853f070e00617ac7f54fc561f3e7e0871a2885fd155fbe92f8af65adf295d5.bin

    • Size

      301KB

    • MD5

      01ff57f4e471bbadcf202705ce68c04c

    • SHA1

      268c6cd97251a1f0eadc97fa02c48beacb325125

    • SHA256

      2c853f070e00617ac7f54fc561f3e7e0871a2885fd155fbe92f8af65adf295d5

    • SHA512

      a053e63f2aaae01f7235588b52de6a71294f90b9e66540c3e68c805a889a95efca23e28a2a7227a7d40bf7d966bc9ba3f80e5fbf4dbbd595654f878f75b96b18

    • SSDEEP

      6144:Gy76FFgDoDMAKtblM/oqdEH5Fg86Rg0AaJNUireP/EuGD:T7RJNcw5FgPg0RJNJeHny

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks