Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    a0a10db94a34a035b8812c95a677141e7db7feae8b4e9db8a9d0ef47cdcca378

  • Size

    9.2MB

  • Sample

    250321-w2e6havyfw

  • MD5

    05bdb147a1b6a4d6473f9de62b534e04

  • SHA1

    afd4d7d0be26f6d4a8a956d11b42f2018eb3ac65

  • SHA256

    a0a10db94a34a035b8812c95a677141e7db7feae8b4e9db8a9d0ef47cdcca378

  • SHA512

    0fefc40e0b35c22ba18e050721908b28c997879385234a71250c093099a5f8fc18affa467ff00b97fa7375ce4ed8905ddc38b33cd33463751909c611f980ab3a

  • SSDEEP

    196608:6cvuh8L64V2/b5OEyxRI06GupgGMJ97M4hWN/G9iNsnl:6c254g/b5O100rupg/m4hI/k7nl

Malware Config

Extracted

Family

octo

AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      a0a10db94a34a035b8812c95a677141e7db7feae8b4e9db8a9d0ef47cdcca378

    • Size

      9.2MB

    • MD5

      05bdb147a1b6a4d6473f9de62b534e04

    • SHA1

      afd4d7d0be26f6d4a8a956d11b42f2018eb3ac65

    • SHA256

      a0a10db94a34a035b8812c95a677141e7db7feae8b4e9db8a9d0ef47cdcca378

    • SHA512

      0fefc40e0b35c22ba18e050721908b28c997879385234a71250c093099a5f8fc18affa467ff00b97fa7375ce4ed8905ddc38b33cd33463751909c611f980ab3a

    • SSDEEP

      196608:6cvuh8L64V2/b5OEyxRI06GupgGMJ97M4hWN/G9iNsnl:6c254g/b5O100rupg/m4hI/k7nl

    • Target

      base.apk

    • Size

      6.6MB

    • MD5

      352555b379fa5312415fdf0839ab7aa1

    • SHA1

      aaa42c72790e109d604530643e5bcbfe85328e28

    • SHA256

      504cf0b50a59ea8f247491e3d176dfb665e39bd1dbc60a4eefbc330d6a4cf0af

    • SHA512

      ff3f3b8fe62d493aa2ce5f3a539a7d8b037995896516604b50a8b52436158a7c6c3554fc1f74819cd3513f39e35121808a2ab39872d1c55caefa12ac269d9a0d

    • SSDEEP

      98304:g5iSRGyqRsk1642+c3XRVKpHINjEYCXJdlbWvxaNff+:griRqR3XRUm/Gyvww

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks