General

  • Target

    584e327fea42c2ce34c7d4abeae9dfd62e72f213921d39404f56881ad8d33bdf.bin

  • Size

    2.2MB

  • Sample

    241225-1ze5yazjbz

  • MD5

    1a50a4e27bb7b6ae70294d6e6cbe0059

  • SHA1

    9e57d193d8824caa49f345fc97fcf8dfd0bcb1a1

  • SHA256

    584e327fea42c2ce34c7d4abeae9dfd62e72f213921d39404f56881ad8d33bdf

  • SHA512

    000adc9d22c3c82dda7b3b4bfed965aa6b1d051838b89d996944768bb48cf1000dcb8538b44f50ad3be137016a0d03a8d68365ec0050d529484078dcf994dd3a

  • SSDEEP

    49152:zVDVq56HiejLVv1scJhKFgTDsGim/a1F2CEstQ4eSQV2msnMAmFYheUBpq9Q1Vm:tVIoRX2G1MQD52mGmFQeUBpq9ws

Malware Config

Extracted

Family

octo

C2

https://aliencivilizations.xyz/YmE4MDdjZjg0NTNi/

https://sevgininkalptensozleriyolu.xyz/YmE4MDdjZjg0NTNi/

https://askvesevginingizemlisozleri.xyz/YmE4MDdjZjg0NTNi/

https://sevgininkalbinisanattanifadesi.xyz/YmE4MDdjZjg0NTNi/

https://duygusalsozlerinsanatidili.xyz/YmE4MDdjZjg0NTNi/

https://sevginintarihindekianlam.xyz/YmE4MDdjZjg0NTNi/

https://askvesevgibilgeliolojisi.xyz/YmE4MDdjZjg0NTNi/

https://sevgininduygusalseruvenleri.xyz/YmE4MDdjZjg0NTNi/

https://kalpleredokunansevgiizleri.xyz/YmE4MDdjZjg0NTNi/

https://sevgininsonsuzluksanati.xyz/YmE4MDdjZjg0NTNi/

https://sozlervesevgikavramlari.xyz/YmE4MDdjZjg0NTNi/

https://askveozlemsanatifelsefesi.xyz/YmE4MDdjZjg0NTNi/

https://sevgininilhamverenhikayeleri.xyz/YmE4MDdjZjg0NTNi/

https://sozvesanatinduygusalifadesi.xyz/YmE4MDdjZjg0NTNi/

https://sevgininkutsaldunyasinyolu.xyz/YmE4MDdjZjg0NTNi/

https://sevgininfelsefikseruvenleri.xyz/YmE4MDdjZjg0NTNi/

https://kalptendokunanhislerinsozleri.xyz/YmE4MDdjZjg0NTNi/

https://askvesevgininzamansizhikayesi.xyz/YmE4MDdjZjg0NTNi/

https://sevgininsanatidunyadayolu.xyz/YmE4MDdjZjg0NTNi/

https://askvesozlerdenoluanzenginlik.xyz/YmE4MDdjZjg0NTNi/

rc4.plain

Extracted

Family

octo

C2

https://aliencivilizations.xyz/YmE4MDdjZjg0NTNi/

https://sevgininkalptensozleriyolu.xyz/YmE4MDdjZjg0NTNi/

https://askvesevginingizemlisozleri.xyz/YmE4MDdjZjg0NTNi/

https://sevgininkalbinisanattanifadesi.xyz/YmE4MDdjZjg0NTNi/

https://duygusalsozlerinsanatidili.xyz/YmE4MDdjZjg0NTNi/

https://sevginintarihindekianlam.xyz/YmE4MDdjZjg0NTNi/

https://askvesevgibilgeliolojisi.xyz/YmE4MDdjZjg0NTNi/

https://sevgininduygusalseruvenleri.xyz/YmE4MDdjZjg0NTNi/

https://kalpleredokunansevgiizleri.xyz/YmE4MDdjZjg0NTNi/

https://sevgininsonsuzluksanati.xyz/YmE4MDdjZjg0NTNi/

https://sozlervesevgikavramlari.xyz/YmE4MDdjZjg0NTNi/

https://askveozlemsanatifelsefesi.xyz/YmE4MDdjZjg0NTNi/

https://sevgininilhamverenhikayeleri.xyz/YmE4MDdjZjg0NTNi/

https://sozvesanatinduygusalifadesi.xyz/YmE4MDdjZjg0NTNi/

https://sevgininkutsaldunyasinyolu.xyz/YmE4MDdjZjg0NTNi/

https://sevgininfelsefikseruvenleri.xyz/YmE4MDdjZjg0NTNi/

https://kalptendokunanhislerinsozleri.xyz/YmE4MDdjZjg0NTNi/

https://askvesevgininzamansizhikayesi.xyz/YmE4MDdjZjg0NTNi/

https://sevgininsanatidunyadayolu.xyz/YmE4MDdjZjg0NTNi/

https://askvesozlerdenoluanzenginlik.xyz/YmE4MDdjZjg0NTNi/

AES_key

Targets

    • Target

      584e327fea42c2ce34c7d4abeae9dfd62e72f213921d39404f56881ad8d33bdf.bin

    • Size

      2.2MB

    • MD5

      1a50a4e27bb7b6ae70294d6e6cbe0059

    • SHA1

      9e57d193d8824caa49f345fc97fcf8dfd0bcb1a1

    • SHA256

      584e327fea42c2ce34c7d4abeae9dfd62e72f213921d39404f56881ad8d33bdf

    • SHA512

      000adc9d22c3c82dda7b3b4bfed965aa6b1d051838b89d996944768bb48cf1000dcb8538b44f50ad3be137016a0d03a8d68365ec0050d529484078dcf994dd3a

    • SSDEEP

      49152:zVDVq56HiejLVv1scJhKFgTDsGim/a1F2CEstQ4eSQV2msnMAmFYheUBpq9Q1Vm:tVIoRX2G1MQD52mGmFQeUBpq9ws

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks