General

  • Target

    ead9f9ebe2e50d869fa82f5ede306c2c9ab89d94f4457e8388201786e12c05c4.bin

  • Size

    1.2MB

  • Sample

    241221-15r2pa1qfq

  • MD5

    eee4ed4095f0998c7a5ffe7beed509be

  • SHA1

    d61dd19f460238a13050ba0b0336bd137f22b147

  • SHA256

    ead9f9ebe2e50d869fa82f5ede306c2c9ab89d94f4457e8388201786e12c05c4

  • SHA512

    af408ee4d3d41bc8aef51decfd27a4b8b1561a443b3ffe17a9cc8ded4e251401b7efeb73c1c80c3554592cdd124d46b4fc72889ce8dab76648fa92c09c8c50e1

  • SSDEEP

    24576:KhszzJltPKfD0FWe2wlESB5O83oevBY6dUB/wSmjSEwdjqkD:K+zVKf2W2lXBM41vBJUtwQrdZ

Malware Config

Extracted

Family

octo

C2

https://94.156.65.160/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.net/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.com/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.xyz/ODRiMzk3Njg3ZThk/

https://scorpionxxxtentionss.net/ODRiMzk3Njg3ZThk/

rc4.plain

Extracted

Family

octo

C2

https://94.156.65.160/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.net/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.com/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.xyz/ODRiMzk3Njg3ZThk/

https://scorpionxxxtentionss.net/ODRiMzk3Njg3ZThk/

AES_key

Targets

    • Target

      ead9f9ebe2e50d869fa82f5ede306c2c9ab89d94f4457e8388201786e12c05c4.bin

    • Size

      1.2MB

    • MD5

      eee4ed4095f0998c7a5ffe7beed509be

    • SHA1

      d61dd19f460238a13050ba0b0336bd137f22b147

    • SHA256

      ead9f9ebe2e50d869fa82f5ede306c2c9ab89d94f4457e8388201786e12c05c4

    • SHA512

      af408ee4d3d41bc8aef51decfd27a4b8b1561a443b3ffe17a9cc8ded4e251401b7efeb73c1c80c3554592cdd124d46b4fc72889ce8dab76648fa92c09c8c50e1

    • SSDEEP

      24576:KhszzJltPKfD0FWe2wlESB5O83oevBY6dUB/wSmjSEwdjqkD:K+zVKf2W2lXBM41vBJUtwQrdZ

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks