General

  • Target

    8c365dad91a9f14e01ad15f0d25ac1c717af76bace34b38858a91ff32767a55f

  • Size

    7.0MB

  • Sample

    250111-tr34gatjd1

  • MD5

    b10286d9db8c141d7363c7aaa5d4510f

  • SHA1

    2a2d0388bbb04c45938eb9a841783d55b2eee3e7

  • SHA256

    8c365dad91a9f14e01ad15f0d25ac1c717af76bace34b38858a91ff32767a55f

  • SHA512

    73a45085969eb8c389b2bc5ccc80be745668b4abb1e393b8818e099a5528757ee252d226dd821cc53c821a9dee75f254971bf8287d97aae867bb166f3d482388

  • SSDEEP

    98304:ZWPjUVKRyeh3Xe5iSRG/k+KZcn+g2te5Rs/UZVCB1P38H:YPIUU83Xer5+/7bRam4B1P4

Malware Config

Extracted

Family

octo

AES_key
AES_key

Targets

    • Target

      8c365dad91a9f14e01ad15f0d25ac1c717af76bace34b38858a91ff32767a55f

    • Size

      7.0MB

    • MD5

      b10286d9db8c141d7363c7aaa5d4510f

    • SHA1

      2a2d0388bbb04c45938eb9a841783d55b2eee3e7

    • SHA256

      8c365dad91a9f14e01ad15f0d25ac1c717af76bace34b38858a91ff32767a55f

    • SHA512

      73a45085969eb8c389b2bc5ccc80be745668b4abb1e393b8818e099a5528757ee252d226dd821cc53c821a9dee75f254971bf8287d97aae867bb166f3d482388

    • SSDEEP

      98304:ZWPjUVKRyeh3Xe5iSRG/k+KZcn+g2te5Rs/UZVCB1P38H:YPIUU83Xer5+/7bRam4B1P4

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks