General

  • Target

    a378825d426606a0a86ec7ec357fcd5c205eaa84d890248f527b8847e3d48538.bin

  • Size

    2.9MB

  • Sample

    250414-14metaywgw

  • MD5

    1a1e1b1556052aaedc9f5956b84ab20d

  • SHA1

    4f1ffb72eec4256cef3c6484690cd898b6f62e06

  • SHA256

    a378825d426606a0a86ec7ec357fcd5c205eaa84d890248f527b8847e3d48538

  • SHA512

    76b2930ce9f5326978655ae0e32a6969c8c9ac5e6f8b31841fe5ab91234498544018d37eaced82786a37ea2d911a1609383ba55ac14fc466e349d4ca8419f627

  • SSDEEP

    49152:ZwsGvebxR3lemg6yCHT5+8fCd8BmbWvxeqPff8tZWI7nX7wYz2nl9P6fXJoxQ+9C:CgN5vHT5RCd9SMW8t17X7wvv6vJD+9Xy

Malware Config

Extracted

Family

octo

C2

https://zoecozum.com/ZGZlZTNiYThiMjcx/

https://adilemutlubirhayat2.com/ZGZlZTNiYThiMjcx/

https://naber25naber.com/ZGZlZTNiYThiMjcx/

https://kelimecozm2u.com/ZGZlZTNiYThiMjcx/

https://naberk1rvee34.com/ZGZlZTNiYThiMjcx/

rc4.plain

Extracted

Family

octo

C2

https://zoecozum.com/ZGZlZTNiYThiMjcx/

https://adilemutlubirhayat2.com/ZGZlZTNiYThiMjcx/

https://naber25naber.com/ZGZlZTNiYThiMjcx/

https://kelimecozm2u.com/ZGZlZTNiYThiMjcx/

https://naberk1rvee34.com/ZGZlZTNiYThiMjcx/

AES_key

Targets

    • Target

      a378825d426606a0a86ec7ec357fcd5c205eaa84d890248f527b8847e3d48538.bin

    • Size

      2.9MB

    • MD5

      1a1e1b1556052aaedc9f5956b84ab20d

    • SHA1

      4f1ffb72eec4256cef3c6484690cd898b6f62e06

    • SHA256

      a378825d426606a0a86ec7ec357fcd5c205eaa84d890248f527b8847e3d48538

    • SHA512

      76b2930ce9f5326978655ae0e32a6969c8c9ac5e6f8b31841fe5ab91234498544018d37eaced82786a37ea2d911a1609383ba55ac14fc466e349d4ca8419f627

    • SSDEEP

      49152:ZwsGvebxR3lemg6yCHT5+8fCd8BmbWvxeqPff8tZWI7nX7wYz2nl9P6fXJoxQ+9C:CgN5vHT5RCd9SMW8t17X7wvv6vJD+9Xy

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v16

Tasks