General

  • Target

    20f7f3802a6d2d2ad98fc7acf6d468413e9ec7d6849ccae41b8d0a793fbc7e86.bin

  • Size

    1.4MB

  • Sample

    241218-12vneatnfy

  • MD5

    3f6421621f70010dd0da8f66ae82cc8c

  • SHA1

    397cc283467d8bc849318723f68be9e1be0cad58

  • SHA256

    20f7f3802a6d2d2ad98fc7acf6d468413e9ec7d6849ccae41b8d0a793fbc7e86

  • SHA512

    7edddb711b6074c420620d19204cfdf3f5f3ffece0401f3b601d81d0a8215435d47597b98581d735b4b7432548f9343ee7f01e2371a5552db6eb6b75402e8d19

  • SSDEEP

    24576:71WbRS1T9vWD0YYY2hSUlfd+Hny9Jc9OJ8qY0LwgZ3t3b3Oa65G7wWa/6hqZxFCK:7ORS1T9XhRfd+CO9TWjZ9r+a65GPWOqP

Malware Config

Extracted

Family

octo

C2

https://uhgtr9jjdiuriegvjudf.top/N2Y5ZmU3OTI5ZDky/

https://ukhfrerl84hnfjdlns.online/N2Y5ZmU3OTI5ZDky/

https://menetory4gert.xyz/N2Y5ZmU3OTI5ZDky/

https://hdewuhunfrv74f.site/N2Y5ZmU3OTI5ZDky/

https://kuurjfds8rjrdiwse.online/N2Y5ZmU3OTI5ZDky/

rc4.plain

Extracted

Family

octo

C2

https://uhgtr9jjdiuriegvjudf.top/N2Y5ZmU3OTI5ZDky/

https://ukhfrerl84hnfjdlns.online/N2Y5ZmU3OTI5ZDky/

https://menetory4gert.xyz/N2Y5ZmU3OTI5ZDky/

https://hdewuhunfrv74f.site/N2Y5ZmU3OTI5ZDky/

https://kuurjfds8rjrdiwse.online/N2Y5ZmU3OTI5ZDky/

AES_key

Targets

    • Target

      20f7f3802a6d2d2ad98fc7acf6d468413e9ec7d6849ccae41b8d0a793fbc7e86.bin

    • Size

      1.4MB

    • MD5

      3f6421621f70010dd0da8f66ae82cc8c

    • SHA1

      397cc283467d8bc849318723f68be9e1be0cad58

    • SHA256

      20f7f3802a6d2d2ad98fc7acf6d468413e9ec7d6849ccae41b8d0a793fbc7e86

    • SHA512

      7edddb711b6074c420620d19204cfdf3f5f3ffece0401f3b601d81d0a8215435d47597b98581d735b4b7432548f9343ee7f01e2371a5552db6eb6b75402e8d19

    • SSDEEP

      24576:71WbRS1T9vWD0YYY2hSUlfd+Hny9Jc9OJ8qY0LwgZ3t3b3Oa65G7wWa/6hqZxFCK:7ORS1T9XhRfd+CO9TWjZ9r+a65GPWOqP

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks