General

  • Target

    7f6ea3155d55c2463cbf8e62b18b22956258ef3adf25ed998d540e9accf3bf08

  • Size

    7.7MB

  • Sample

    241216-c8wbhszng1

  • MD5

    dff1889e5db5d5db6b1c5eaf923e0227

  • SHA1

    2aa200b7f5b05152fb927d8bc062f0f1c10e1e76

  • SHA256

    7f6ea3155d55c2463cbf8e62b18b22956258ef3adf25ed998d540e9accf3bf08

  • SHA512

    0c4213943bfe08da4f2339b9f07fcd2f0f361ca0682dbd8bbec035f22a5a04301b00d51b82cc9ea806004a05cd78014cc6d87f31980d608a7916e19fc6fb9514

  • SSDEEP

    98304:g9b5iSRGjSRs9odlmoKnw6VK0umngj74lOmv0Q9Yh4z6:g9brdRkodlGBU/mgj7Yf9Y9

Malware Config

Extracted

Family

octo

AES_key
AES_key

Targets

    • Target

      7f6ea3155d55c2463cbf8e62b18b22956258ef3adf25ed998d540e9accf3bf08

    • Size

      7.7MB

    • MD5

      dff1889e5db5d5db6b1c5eaf923e0227

    • SHA1

      2aa200b7f5b05152fb927d8bc062f0f1c10e1e76

    • SHA256

      7f6ea3155d55c2463cbf8e62b18b22956258ef3adf25ed998d540e9accf3bf08

    • SHA512

      0c4213943bfe08da4f2339b9f07fcd2f0f361ca0682dbd8bbec035f22a5a04301b00d51b82cc9ea806004a05cd78014cc6d87f31980d608a7916e19fc6fb9514

    • SSDEEP

      98304:g9b5iSRGjSRs9odlmoKnw6VK0umngj74lOmv0Q9Yh4z6:g9brdRkodlGBU/mgj7Yf9Y9

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks