Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    c5c561e14c662845235798b834f189e1c1d4a6aa2951794e6f99b09eba500523.bin

  • Size

    2.7MB

  • Sample

    250106-1wwzaa1qhk

  • MD5

    485a9c2fd05e0c133452d33ca0846bbd

  • SHA1

    08deaa11acd65da08f5881aa9b8f02e0d489a4b2

  • SHA256

    c5c561e14c662845235798b834f189e1c1d4a6aa2951794e6f99b09eba500523

  • SHA512

    5fdaedd4e8232da3220385f6de8d58242a647484b736433a61fa2f3d321d13ac92e53bbc8c3cea839f1af119f6cb84205cf7d79f26eda58b14f27e5e253e7e23

  • SSDEEP

    49152:Yflb6Kjcf1ObPyI4trAm8a8KLGBHzFOTkCMmn6U9BrVT9mDl8r601sS8IQz:Y5FjEI4iZaUzYH99yIS

Malware Config

Extracted

Family

octo

C2

https://80.76.51.206:7117/gate/

rc4.plain
1
ntIkBrPN9abLOCltkM

Extracted

Family

octo

C2

https://80.76.51.206:7117/gate/

AES_key
1
3534353639643261616165373137363333356136376266373265383637333666

Targets

    • Target

      c5c561e14c662845235798b834f189e1c1d4a6aa2951794e6f99b09eba500523.bin

    • Size

      2.7MB

    • MD5

      485a9c2fd05e0c133452d33ca0846bbd

    • SHA1

      08deaa11acd65da08f5881aa9b8f02e0d489a4b2

    • SHA256

      c5c561e14c662845235798b834f189e1c1d4a6aa2951794e6f99b09eba500523

    • SHA512

      5fdaedd4e8232da3220385f6de8d58242a647484b736433a61fa2f3d321d13ac92e53bbc8c3cea839f1af119f6cb84205cf7d79f26eda58b14f27e5e253e7e23

    • SSDEEP

      49152:Yflb6Kjcf1ObPyI4trAm8a8KLGBHzFOTkCMmn6U9BrVT9mDl8r601sS8IQz:Y5FjEI4iZaUzYH99yIS

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.