General

  • Target

    880bf4bd010f4ebc53b98c9cff6f325206f9a2911f120a660a7b0cbbbdc6651d

  • Size

    4.8MB

  • Sample

    250109-tvy9patrcw

  • MD5

    c0ab904f8dc807c5699338318460c5a9

  • SHA1

    d2604185195c1ff3a189ef22887f232bdc75b188

  • SHA256

    880bf4bd010f4ebc53b98c9cff6f325206f9a2911f120a660a7b0cbbbdc6651d

  • SHA512

    9457ee16242040d5a3320c370417a41bd6f6947b77e2e8d456a1fdff9700ad77255ef8bb72a0234ba2187a7bc3bdfc0d64b27e949d1f942231ef4afee710de0d

  • SSDEEP

    49152:8RsEXRa4IKSmj7+45iS7xrGjv5ALfxjVKSc71ZGpwwzcD4/RK:8RsLBrmj7v5iSRGapVKjztD4s

Malware Config

Extracted

Family

octo

C2

https://3a9b906a12e3b9df503da3b0ed88bec4.org

https://b6d49a6f6b383cb2988f093ecf632b47.autos

https://07045dbd7e0b6b6bc1fc248ec8003e13.info

https://6e83ceccee15263e02f01d3a76f6df57.space

https://139583fb8545ad34ae278ead4525363d.shop

https://584d388a3934030076f521f107a861f9.cfd

https://4e13effc9078593d34083068c9082361.cloud

https://01dcbb9d534787b6a73412262f4ce244.online

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      880bf4bd010f4ebc53b98c9cff6f325206f9a2911f120a660a7b0cbbbdc6651d

    • Size

      4.8MB

    • MD5

      c0ab904f8dc807c5699338318460c5a9

    • SHA1

      d2604185195c1ff3a189ef22887f232bdc75b188

    • SHA256

      880bf4bd010f4ebc53b98c9cff6f325206f9a2911f120a660a7b0cbbbdc6651d

    • SHA512

      9457ee16242040d5a3320c370417a41bd6f6947b77e2e8d456a1fdff9700ad77255ef8bb72a0234ba2187a7bc3bdfc0d64b27e949d1f942231ef4afee710de0d

    • SSDEEP

      49152:8RsEXRa4IKSmj7+45iS7xrGjv5ALfxjVKSc71ZGpwwzcD4/RK:8RsLBrmj7v5iSRGapVKjztD4s

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks