General

  • Target

    1aae1e81737161f4db26824a61d8570b775dc882b4d30ecf428452810b63853f

  • Size

    5.9MB

  • Sample

    250321-vtv2batwey

  • MD5

    9f0cb7d6293cd253a6be2c1ae716dfea

  • SHA1

    fa3fdb49ddf5baacca4f427c2c55790edfc08699

  • SHA256

    1aae1e81737161f4db26824a61d8570b775dc882b4d30ecf428452810b63853f

  • SHA512

    0fd8f52d5e56acd601b8d97e65728c31dba6b8384f1e0e4c4ffb14f387b0834fdc83b8572d452a573815b19188c7d701b4076a4301407019e832e08fa2dc3e1b

  • SSDEEP

    98304:wENjmXd2ZrWmCKgOFqZDbD25aCHZkw/8J1YUfF6tQnI1YJG05O86HDevuQ9:RCb7CHqw/+15F6CI1QG05OlHDev39

Malware Config

Extracted

Family

octo

C2

https://emonifados.quest/YWFiM2VkMmFmNWFh/

https://emonifados000.net/YWFiM2VkMmFmNWFh/

rc4.plain

Extracted

Family

octo

C2

https://emonifados.quest/YWFiM2VkMmFmNWFh/

https://emonifados000.net/YWFiM2VkMmFmNWFh/

AES_key

Targets

    • Target

      1aae1e81737161f4db26824a61d8570b775dc882b4d30ecf428452810b63853f

    • Size

      5.9MB

    • MD5

      9f0cb7d6293cd253a6be2c1ae716dfea

    • SHA1

      fa3fdb49ddf5baacca4f427c2c55790edfc08699

    • SHA256

      1aae1e81737161f4db26824a61d8570b775dc882b4d30ecf428452810b63853f

    • SHA512

      0fd8f52d5e56acd601b8d97e65728c31dba6b8384f1e0e4c4ffb14f387b0834fdc83b8572d452a573815b19188c7d701b4076a4301407019e832e08fa2dc3e1b

    • SSDEEP

      98304:wENjmXd2ZrWmCKgOFqZDbD25aCHZkw/8J1YUfF6tQnI1YJG05O86HDevuQ9:RCb7CHqw/+15F6CI1QG05OlHDev39

    • Target

      base.apk

    • Size

      1.6MB

    • MD5

      871ad2475ababea9dc67fa3396662753

    • SHA1

      65702d5bc3e5f6e342a46102f780f7f12eb023e7

    • SHA256

      2ab2c7af22028d3e7bd62de16d787f1b6718d1cf49955cba0844d9280b15ae2d

    • SHA512

      5c2880e153077751db5156cdb8088c2e236aacd1a7ae19b43cfd2983581d76af8edc87c1878f52de6ed48d6681c97b6561947917732d021ff6d0cb36fd9deb38

    • SSDEEP

      24576:U4LQL0ewuycOF0fMTYFxxnJg7viCZFPrQbbpEPLVnbhKYSlX/p4dQMqSoxtRQAxh:RRhYF5g7viShrMSjRhKYRdQMqSoHXz

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks