General

  • Target

    36fca276cc44383ae95908f643e6c451e371557a2574f83a7882e967657eb31f.bin

  • Size

    2.3MB

  • Sample

    241210-1zx1ra1pez

  • MD5

    9cab84407ec52e5af913471aba41c7fc

  • SHA1

    212bb56dee6fca312f32c0c70a4d929bb65e3d36

  • SHA256

    36fca276cc44383ae95908f643e6c451e371557a2574f83a7882e967657eb31f

  • SHA512

    51cbb2ddcf0c6ac6ede84f1bec8df70771c72e6f85d636864523ed8e9ba7dd7f53860d30ad4c4c55767054f81e60f0fcc7a317cedf33461f9297f0b3c22c904b

  • SSDEEP

    49152:iJuVl6dC4e2WcK1bKjCwrq0Z/Np+M6s2QtKOW+WaaQhzPlrTs7KZuqlCok4Lf:kdC4hVtWY+M6LM7fPJTsGMmk4b

Malware Config

Extracted

Family

octo

C2

https://zorhayatdersleriyolu.xyz/MDQ2MTZjMDhlZDQy/

https://azminsonundabasari.xyz/MDQ2MTZjMDhlZDQy/

https://yasananduygularhikaye.xyz/MDQ2MTZjMDhlZDQy/

https://hayatinbitmeyendersler.xyz/MDQ2MTZjMDhlZDQy/

https://zorlarinkucukcikisi.xyz/MDQ2MTZjMDhlZDQy/

https://umutvegayretinyolu.xyz/MDQ2MTZjMDhlZDQy/

https://hayatmucadelesininyolu.xyz/MDQ2MTZjMDhlZDQy/

https://yokustapratikcozum.xyz/MDQ2MTZjMDhlZDQy/

https://kucukbasarilaringucu.xyz/MDQ2MTZjMDhlZDQy/

https://engelvemucadeledolu.xyz/MDQ2MTZjMDhlZDQy/

https://yasamderslerininhikayesi.xyz/MDQ2MTZjMDhlZDQy/

https://mucadelevebasarininhik.xyz/MDQ2MTZjMDhlZDQy/

https://yasambizeogretendeger.xyz/MDQ2MTZjMDhlZDQy/

https://hayatdersleryenibasari.xyz/MDQ2MTZjMDhlZDQy/

https://zorhayatinsessizcalismasi.xyz/MDQ2MTZjMDhlZDQy/

https://zorluklardakiogrenimyolu.xyz/MDQ2MTZjMDhlZDQy/

https://azimvekararlilikdersleri.xyz/MDQ2MTZjMDhlZDQy/

https://hayattanhayatatogren.xyz/MDQ2MTZjMDhlZDQy/

https://zorluklardekiyenifirsatlar.xyz/MDQ2MTZjMDhlZDQy/

https://yasamveyolculukdizeleri.xyz/MDQ2MTZjMDhlZDQy/

rc4.plain

Extracted

Family

octo

C2

https://zorhayatdersleriyolu.xyz/MDQ2MTZjMDhlZDQy/

https://azminsonundabasari.xyz/MDQ2MTZjMDhlZDQy/

https://yasananduygularhikaye.xyz/MDQ2MTZjMDhlZDQy/

https://hayatinbitmeyendersler.xyz/MDQ2MTZjMDhlZDQy/

https://zorlarinkucukcikisi.xyz/MDQ2MTZjMDhlZDQy/

https://umutvegayretinyolu.xyz/MDQ2MTZjMDhlZDQy/

https://hayatmucadelesininyolu.xyz/MDQ2MTZjMDhlZDQy/

https://yokustapratikcozum.xyz/MDQ2MTZjMDhlZDQy/

https://kucukbasarilaringucu.xyz/MDQ2MTZjMDhlZDQy/

https://engelvemucadeledolu.xyz/MDQ2MTZjMDhlZDQy/

https://yasamderslerininhikayesi.xyz/MDQ2MTZjMDhlZDQy/

https://mucadelevebasarininhik.xyz/MDQ2MTZjMDhlZDQy/

https://yasambizeogretendeger.xyz/MDQ2MTZjMDhlZDQy/

https://hayatdersleryenibasari.xyz/MDQ2MTZjMDhlZDQy/

https://zorhayatinsessizcalismasi.xyz/MDQ2MTZjMDhlZDQy/

https://zorluklardakiogrenimyolu.xyz/MDQ2MTZjMDhlZDQy/

https://azimvekararlilikdersleri.xyz/MDQ2MTZjMDhlZDQy/

https://hayattanhayatatogren.xyz/MDQ2MTZjMDhlZDQy/

https://zorluklardekiyenifirsatlar.xyz/MDQ2MTZjMDhlZDQy/

https://yasamveyolculukdizeleri.xyz/MDQ2MTZjMDhlZDQy/

AES_key

Targets

    • Target

      36fca276cc44383ae95908f643e6c451e371557a2574f83a7882e967657eb31f.bin

    • Size

      2.3MB

    • MD5

      9cab84407ec52e5af913471aba41c7fc

    • SHA1

      212bb56dee6fca312f32c0c70a4d929bb65e3d36

    • SHA256

      36fca276cc44383ae95908f643e6c451e371557a2574f83a7882e967657eb31f

    • SHA512

      51cbb2ddcf0c6ac6ede84f1bec8df70771c72e6f85d636864523ed8e9ba7dd7f53860d30ad4c4c55767054f81e60f0fcc7a317cedf33461f9297f0b3c22c904b

    • SSDEEP

      49152:iJuVl6dC4e2WcK1bKjCwrq0Z/Np+M6s2QtKOW+WaaQhzPlrTs7KZuqlCok4Lf:kdC4hVtWY+M6LM7fPJTsGMmk4b

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks