General

  • Target

    e9f5ce7d5ee6570d96ea971f96f86a6748430e65e20f02c3cef69a63f1d4cbfa.bin

  • Size

    2.4MB

  • Sample

    241225-1zybhszmek

  • MD5

    61c08a07adb551a4254deba210997041

  • SHA1

    fe296e7d176dbe489de39c5ff842d1e23367d378

  • SHA256

    e9f5ce7d5ee6570d96ea971f96f86a6748430e65e20f02c3cef69a63f1d4cbfa

  • SHA512

    dc1e7d6847e959352c67c4d0e76018a050aa26859c6ee10544207776f2199b9e3c5fe5b3fba8b17b1e49580dfefbab5e1979f36ca1212ae6a5a415bad929856a

  • SSDEEP

    49152:cMqoPqR2Ob/tNIzJZqlcBK/y8fwvFfM3FHvXH1CUzrvR08W3LDNGjx:S92OLbgmPy8fmU3pXwUzrK8W3gjx

Malware Config

Extracted

Family

octo

C2

https://4646serhse844sererher65.com/NTA4MzIxMjdkYzNj/

https://897eshers64dferhe4664.com/NTA4MzIxMjdkYzNj/

https://464655serhse844sererher65.com/NTA4MzIxMjdkYzNj/

https://891131337eshers64dferhe4664.com/NTA4MzIxMjdkYzNj/

rc4.plain

Extracted

Family

octo

C2

https://4646serhse844sererher65.com/NTA4MzIxMjdkYzNj/

https://897eshers64dferhe4664.com/NTA4MzIxMjdkYzNj/

https://464655serhse844sererher65.com/NTA4MzIxMjdkYzNj/

https://891131337eshers64dferhe4664.com/NTA4MzIxMjdkYzNj/

AES_key

Targets

    • Target

      e9f5ce7d5ee6570d96ea971f96f86a6748430e65e20f02c3cef69a63f1d4cbfa.bin

    • Size

      2.4MB

    • MD5

      61c08a07adb551a4254deba210997041

    • SHA1

      fe296e7d176dbe489de39c5ff842d1e23367d378

    • SHA256

      e9f5ce7d5ee6570d96ea971f96f86a6748430e65e20f02c3cef69a63f1d4cbfa

    • SHA512

      dc1e7d6847e959352c67c4d0e76018a050aa26859c6ee10544207776f2199b9e3c5fe5b3fba8b17b1e49580dfefbab5e1979f36ca1212ae6a5a415bad929856a

    • SSDEEP

      49152:cMqoPqR2Ob/tNIzJZqlcBK/y8fwvFfM3FHvXH1CUzrvR08W3LDNGjx:S92OLbgmPy8fmU3pXwUzrK8W3gjx

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks