General

  • Target

    58a6a6d288627134af0f16e0c9650db1111317539888a6a5b6b8f6007bd258dd.bin

  • Size

    2.3MB

  • Sample

    241221-1yf1va1ncp

  • MD5

    dfcdda21f7229f28b9f549de9a94b163

  • SHA1

    ce4e2901ec3d4831315f8608d8820cfd124e1976

  • SHA256

    58a6a6d288627134af0f16e0c9650db1111317539888a6a5b6b8f6007bd258dd

  • SHA512

    cf6ab59d791569aba94ca5d058789637faa1b4a1e94f183b65bbd6363ec38af7a30606c4927e07ae8cff2f1321fd36fc83b82ce875df6429bb0f9edb9d29b719

  • SSDEEP

    49152:/7wn4v7jJVw8NII7eTl6f8ARx2gS8PXaCCgeQeGvtcjBiUspU0DCd4oCn8k+F:/7w4jFRNIr0sClIlBns2aCeo/fF

Malware Config

Extracted

Family

octo

C2

https://mksdasdoasdkma.tech/MTBiYTAyMTk0NzJj/

https://uiaydiausydiuasyd.store/MTBiYTAyMTk0NzJj/

https://askjdajksdhas.site/MTBiYTAyMTk0NzJj/

https://kmsadoasdkasodkma.lol/MTBiYTAyMTk0NzJj/

https://aksjdhaskjdasjkhdsa.online/MTBiYTAyMTk0NzJj/

rc4.plain

Extracted

Family

octo

C2

https://mksdasdoasdkma.tech/MTBiYTAyMTk0NzJj/

https://uiaydiausydiuasyd.store/MTBiYTAyMTk0NzJj/

https://askjdajksdhas.site/MTBiYTAyMTk0NzJj/

https://kmsadoasdkasodkma.lol/MTBiYTAyMTk0NzJj/

https://aksjdhaskjdasjkhdsa.online/MTBiYTAyMTk0NzJj/

AES_key

Targets

    • Target

      58a6a6d288627134af0f16e0c9650db1111317539888a6a5b6b8f6007bd258dd.bin

    • Size

      2.3MB

    • MD5

      dfcdda21f7229f28b9f549de9a94b163

    • SHA1

      ce4e2901ec3d4831315f8608d8820cfd124e1976

    • SHA256

      58a6a6d288627134af0f16e0c9650db1111317539888a6a5b6b8f6007bd258dd

    • SHA512

      cf6ab59d791569aba94ca5d058789637faa1b4a1e94f183b65bbd6363ec38af7a30606c4927e07ae8cff2f1321fd36fc83b82ce875df6429bb0f9edb9d29b719

    • SSDEEP

      49152:/7wn4v7jJVw8NII7eTl6f8ARx2gS8PXaCCgeQeGvtcjBiUspU0DCd4oCn8k+F:/7w4jFRNIr0sClIlBns2aCeo/fF

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks