General

  • Target

    af4feabbfb8acb49d9b7a39c0a077834ab9ed8f0e061d5c1c661e46d4c28f105.bin

  • Size

    245KB

  • Sample

    250411-144n4a1te1

  • MD5

    ad9c0f9e5f2b739e6db33312e460cff4

  • SHA1

    7f1c4ec6e4129479a458c2c3598ddbee7348d989

  • SHA256

    af4feabbfb8acb49d9b7a39c0a077834ab9ed8f0e061d5c1c661e46d4c28f105

  • SHA512

    b8a95ffdca5a48c4b6b3509a0bb61ece7a0f3651c3941d89681ef2d7f40e5537c68fbcdf17144844bfe26b72b888e4067f9a3405be330bf7e3d33242e846360f

  • SSDEEP

    6144:hTksH5r4DR8RG0rOWVgYaOe4UeSexulbCeL6Rg0LrJp/EuGT:pkoh46R77/SbOg0HJpni

Malware Config

Extracted

Family

octo

C2

https://dreamcloudhub.xyz/MzZkNTliNTU4NDhl/

https://sunflowerland.xyz/MzZkNTliNTU4NDhl/

https://dreamcloudsite.xyz/MzZkNTliNTU4NDhl/

https://goldenbirdhub.xyz/MzZkNTliNTU4NDhl/

https://sunflowerhub.xyz/MzZkNTliNTU4NDhl/

https://goldenbirdzone.xyz/MzZkNTliNTU4NDhl/

https://skyfallzone.xyz/MzZkNTliNTU4NDhl/

https://firestormsite.xyz/MzZkNTliNTU4NDhl/

https://bluemoonland.xyz/MzZkNTliNTU4NDhl/

https://searockhub.xyz/MzZkNTliNTU4NDhl/

https://snowflakezone.xyz/MzZkNTliNTU4NDhl/

https://silverlineworld.xyz/MzZkNTliNTU4NDhl/

https://sunflowerzone.xyz/MzZkNTliNTU4NDhl/

rc4.plain

Extracted

Family

octo

C2

https://dreamcloudhub.xyz/MzZkNTliNTU4NDhl/

https://sunflowerland.xyz/MzZkNTliNTU4NDhl/

https://dreamcloudsite.xyz/MzZkNTliNTU4NDhl/

https://goldenbirdhub.xyz/MzZkNTliNTU4NDhl/

https://sunflowerhub.xyz/MzZkNTliNTU4NDhl/

https://goldenbirdzone.xyz/MzZkNTliNTU4NDhl/

https://skyfallzone.xyz/MzZkNTliNTU4NDhl/

https://firestormsite.xyz/MzZkNTliNTU4NDhl/

https://bluemoonland.xyz/MzZkNTliNTU4NDhl/

https://searockhub.xyz/MzZkNTliNTU4NDhl/

https://snowflakezone.xyz/MzZkNTliNTU4NDhl/

https://silverlineworld.xyz/MzZkNTliNTU4NDhl/

https://sunflowerzone.xyz/MzZkNTliNTU4NDhl/

AES_key

Targets

    • Target

      af4feabbfb8acb49d9b7a39c0a077834ab9ed8f0e061d5c1c661e46d4c28f105.bin

    • Size

      245KB

    • MD5

      ad9c0f9e5f2b739e6db33312e460cff4

    • SHA1

      7f1c4ec6e4129479a458c2c3598ddbee7348d989

    • SHA256

      af4feabbfb8acb49d9b7a39c0a077834ab9ed8f0e061d5c1c661e46d4c28f105

    • SHA512

      b8a95ffdca5a48c4b6b3509a0bb61ece7a0f3651c3941d89681ef2d7f40e5537c68fbcdf17144844bfe26b72b888e4067f9a3405be330bf7e3d33242e846360f

    • SSDEEP

      6144:hTksH5r4DR8RG0rOWVgYaOe4UeSexulbCeL6Rg0LrJp/EuGT:pkoh46R77/SbOg0HJpni

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v16

Tasks