General

  • Target

    781d5409ff149b660810879b944061f0726472b343703a62265da5fd53778093

  • Size

    4.8MB

  • Sample

    241201-2pn6jawjdy

  • MD5

    bbe8192c5ccf52aed368221474985137

  • SHA1

    09651ff93a5305f7c43bf7463ebdbe8d36108b95

  • SHA256

    781d5409ff149b660810879b944061f0726472b343703a62265da5fd53778093

  • SHA512

    b16647d70357e1bd03b88396d7134f27dec279cd107ce184fcbddd603ad8c95fbc4cb2967608b2d6ee60471df2d93c4caad4d89e107fa5990f8f8279dd2b8561

  • SSDEEP

    49152:6RsEXT0daIKzX3Xgv45iS7xrGBD168/JjVKScb2ybPdM/uZJTRjn7CO:6RsIWaIOX3Xv5iSRGRxVKPSuJF7CO

Malware Config

Extracted

Family

octo

C2

https://f152a453a10af7a3938e8b08004e3f69.xyz

https://f36076e468df2173d4ed868bf44bdc54.top

https://11bd376f7993ea4803714825eafc0c9b.website

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      781d5409ff149b660810879b944061f0726472b343703a62265da5fd53778093

    • Size

      4.8MB

    • MD5

      bbe8192c5ccf52aed368221474985137

    • SHA1

      09651ff93a5305f7c43bf7463ebdbe8d36108b95

    • SHA256

      781d5409ff149b660810879b944061f0726472b343703a62265da5fd53778093

    • SHA512

      b16647d70357e1bd03b88396d7134f27dec279cd107ce184fcbddd603ad8c95fbc4cb2967608b2d6ee60471df2d93c4caad4d89e107fa5990f8f8279dd2b8561

    • SSDEEP

      49152:6RsEXT0daIKzX3Xgv45iS7xrGBD168/JjVKScb2ybPdM/uZJTRjn7CO:6RsIWaIOX3Xv5iSRGRxVKPSuJF7CO

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks