General

  • Target

    2e01b24ebe3c6ec564032ceab386346d5a67b8a8cd2be501a42e3d99c1929dc6.bin

  • Size

    273KB

  • Sample

    250115-1yjfzawph1

  • MD5

    147d0ee5de45708c21b0484809d1fc5e

  • SHA1

    aca229a3e3ed151def9394efa5b5b6727fbad408

  • SHA256

    2e01b24ebe3c6ec564032ceab386346d5a67b8a8cd2be501a42e3d99c1929dc6

  • SHA512

    1857e91007c24c20ebc94e1677270d958a60ccbf2822e0e677a5750eeb1836fdbff40e11b9156329ff47e612dddb68213d2a0dac7b0d23475ebf84bd5bd11e79

  • SSDEEP

    6144:292y6JH0rOag0SNpAthlaNlm1O6Rg0ZrQaINUop/EuGzC:292yI7+N+019g0dBINXpnEC

Malware Config

Extracted

Family

octo

C2

https://sevdadanceyizims.xyz/NWNlNzMzN2Y4NmI2/

https://hayataduyarlikanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerveumutmasallari.xyz/NWNlNzMzN2Y4NmI2/

https://sevgiiledolucanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlergizemlihikayeleri.xyz/NWNlNzMzN2Y4NmI2/

https://dogayaonericanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerinmutlulukhikayeleri.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlervebarisdostlugu.xyz/NWNlNzMzN2Y4NmI2/

https://hayalguclucanseverlerdiyari.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerveguzellikyolu.xyz/NWNlNzMzN2Y4NmI2/

https://dogasevervecanseverkulubu.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlervesanatodaklihayat.xyz/NWNlNzMzN2Y4NmI2/

https://yasamicemiyeticanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlericinhikayekosesi.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlervekalptenhikayeler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlervedogayayasam.xyz/NWNlNzMzN2Y4NmI2/

https://canseverleryasamvesanat.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerleguzelhikayeler.xyz/NWNlNzMzN2Y4NmI2/

https://dogadakiguzelliklercanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerinicindeumutxyz.xyz/NWNlNzMzN2Y4NmI2/

rc4.plain

Extracted

Family

octo

C2

https://sevdadanceyizims.xyz/NWNlNzMzN2Y4NmI2/

https://hayataduyarlikanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerveumutmasallari.xyz/NWNlNzMzN2Y4NmI2/

https://sevgiiledolucanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlergizemlihikayeleri.xyz/NWNlNzMzN2Y4NmI2/

https://dogayaonericanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerinmutlulukhikayeleri.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlervebarisdostlugu.xyz/NWNlNzMzN2Y4NmI2/

https://hayalguclucanseverlerdiyari.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerveguzellikyolu.xyz/NWNlNzMzN2Y4NmI2/

https://dogasevervecanseverkulubu.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlervesanatodaklihayat.xyz/NWNlNzMzN2Y4NmI2/

https://yasamicemiyeticanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlericinhikayekosesi.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlervekalptenhikayeler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlervedogayayasam.xyz/NWNlNzMzN2Y4NmI2/

https://canseverleryasamvesanat.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerleguzelhikayeler.xyz/NWNlNzMzN2Y4NmI2/

https://dogadakiguzelliklercanseverler.xyz/NWNlNzMzN2Y4NmI2/

https://canseverlerinicindeumutxyz.xyz/NWNlNzMzN2Y4NmI2/

AES_key

Targets

    • Target

      2e01b24ebe3c6ec564032ceab386346d5a67b8a8cd2be501a42e3d99c1929dc6.bin

    • Size

      273KB

    • MD5

      147d0ee5de45708c21b0484809d1fc5e

    • SHA1

      aca229a3e3ed151def9394efa5b5b6727fbad408

    • SHA256

      2e01b24ebe3c6ec564032ceab386346d5a67b8a8cd2be501a42e3d99c1929dc6

    • SHA512

      1857e91007c24c20ebc94e1677270d958a60ccbf2822e0e677a5750eeb1836fdbff40e11b9156329ff47e612dddb68213d2a0dac7b0d23475ebf84bd5bd11e79

    • SSDEEP

      6144:292y6JH0rOag0SNpAthlaNlm1O6Rg0ZrQaINUop/EuGzC:292yI7+N+019g0dBINXpnEC

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks