General

  • Target

    7e792ff22711078c41f2623730a69ad6818b87764f712c7841984794604069a7

  • Size

    9.2MB

  • Sample

    241201-2b96vavlex

  • MD5

    701224ab054633f0d7cc5a177b0ef411

  • SHA1

    a669694c71bae67cd6b4fb9e4c09445b2631176a

  • SHA256

    7e792ff22711078c41f2623730a69ad6818b87764f712c7841984794604069a7

  • SHA512

    d52c95f097e6cdbbe25b3206ebd36edb3cb5c8755c1f5926f601b107ccd6e2832ee1d7b6126f66f9f66b57802119dac2da324f9cfeae92c51148caf966ab4d4e

  • SSDEEP

    196608:UHCbuN232dRfTDWPH52kCgldaURD0JkBlgRLS046Wb3aF7hm8sLr4KHzeuf:YCyNA2kH5MgloURD0GBAe046WTaF7SL1

Malware Config

Extracted

Family

octo

C2

https://156350786312d7feba2b1c9b7577097b.com

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      7e792ff22711078c41f2623730a69ad6818b87764f712c7841984794604069a7

    • Size

      9.2MB

    • MD5

      701224ab054633f0d7cc5a177b0ef411

    • SHA1

      a669694c71bae67cd6b4fb9e4c09445b2631176a

    • SHA256

      7e792ff22711078c41f2623730a69ad6818b87764f712c7841984794604069a7

    • SHA512

      d52c95f097e6cdbbe25b3206ebd36edb3cb5c8755c1f5926f601b107ccd6e2832ee1d7b6126f66f9f66b57802119dac2da324f9cfeae92c51148caf966ab4d4e

    • SSDEEP

      196608:UHCbuN232dRfTDWPH52kCgldaURD0JkBlgRLS046Wb3aF7hm8sLr4KHzeuf:YCyNA2kH5MgloURD0GBAe046WTaF7SL1

    • Target

      base.apk

    • Size

      7.9MB

    • MD5

      9b4bff2a39ecf16e27b0a072f48384ee

    • SHA1

      05ba498022cc77aa32cff8dcd5cc85b002ceedca

    • SHA256

      7de51c2775e3de444c5a12fcc1b92ba178e3205041c132fc4c47792252092a51

    • SHA512

      06ba420cf8779e11f72d57c774efe7f74012c4c1583946ae91fb16e8b21c3fd474d7ad073bf3ec7bb14534843ac4c81041bd3e74e8f3506b74e0c0e4fa0dc3af

    • SSDEEP

      98304:ECJIYdaOT0eY5iSRGd839J5FrRswXizj7qVKiQj1Qe35/Qcmc3:j7Ir5r5FrRZ2j7qUVjv/Q+3

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks