General

  • Target

    b35d0e986be46ef9965a7b05480caa4a70f696a187f56abde79509d7e7d5d616.bin

  • Size

    537KB

  • Sample

    241204-1ykc9stldt

  • MD5

    27fa6c80389845fcc4b1fd4e49b41e6b

  • SHA1

    76a2ff1fb35522dd13da0b221b1516c011992633

  • SHA256

    b35d0e986be46ef9965a7b05480caa4a70f696a187f56abde79509d7e7d5d616

  • SHA512

    8d770ae2e1a284fd10c06363f1067d213fd0b02e729eae1a76360b90285d8cb9556ee9cbfebdd5b548691f7172dabaddc1346b6362e4953f4fab8cdf6d2156cc

  • SSDEEP

    12288:P2gBi2LExgmhgGaZjf7JaRdmXyVgqQpmYwZ1W6AvOH2LaMPG:P2gBiPzpa5tJiqmyFRLm

Malware Config

Extracted

Family

octo

C2

https://24fdghhoo1.top/doc/

https://25fdghhoo1.top/doc/

https://26fdghhoo1.top/doc/

https://27fdghhoo1.top/doc/

https://28fdghhoo1.top/doc/

https://29fdghhoo1.top/doc/

https://210fdghhoo1.top/doc/

https://211fdghhoo1.top/doc/

https://122fdghhoo1.top/doc/

https://123fdghhoo1.top/doc/

https://124fdghhoo1.top/doc/

https://125fdghhoo1.top/doc/

https://126fdghhoo1.top/doc/

https://127fdghhoo1.top/doc/

https://128fdghhoo1.top/doc/

https://129fdghhoo1.top/doc/

https://220fdghhoo1.top/doc/

https://234fdghhoo1.top/doc/

https://235fdghhoo1.top/doc/

https://236fdghhoo1.top/doc/

rc4.plain

Extracted

Family

octo

C2

https://24fdghhoo1.top/doc/

https://25fdghhoo1.top/doc/

https://26fdghhoo1.top/doc/

https://27fdghhoo1.top/doc/

https://28fdghhoo1.top/doc/

https://29fdghhoo1.top/doc/

https://210fdghhoo1.top/doc/

https://211fdghhoo1.top/doc/

https://122fdghhoo1.top/doc/

https://123fdghhoo1.top/doc/

https://124fdghhoo1.top/doc/

https://125fdghhoo1.top/doc/

https://126fdghhoo1.top/doc/

https://127fdghhoo1.top/doc/

https://128fdghhoo1.top/doc/

https://129fdghhoo1.top/doc/

https://220fdghhoo1.top/doc/

https://234fdghhoo1.top/doc/

https://235fdghhoo1.top/doc/

https://236fdghhoo1.top/doc/

AES_key

Targets

    • Target

      b35d0e986be46ef9965a7b05480caa4a70f696a187f56abde79509d7e7d5d616.bin

    • Size

      537KB

    • MD5

      27fa6c80389845fcc4b1fd4e49b41e6b

    • SHA1

      76a2ff1fb35522dd13da0b221b1516c011992633

    • SHA256

      b35d0e986be46ef9965a7b05480caa4a70f696a187f56abde79509d7e7d5d616

    • SHA512

      8d770ae2e1a284fd10c06363f1067d213fd0b02e729eae1a76360b90285d8cb9556ee9cbfebdd5b548691f7172dabaddc1346b6362e4953f4fab8cdf6d2156cc

    • SSDEEP

      12288:P2gBi2LExgmhgGaZjf7JaRdmXyVgqQpmYwZ1W6AvOH2LaMPG:P2gBiPzpa5tJiqmyFRLm

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks