General
-
Target
4261cc05a8c4ecaf1605ef931397a4d97cc12fe38738a4f6016c3695aa2c571f
-
Size
1.4MB
-
Sample
230313-kb22ssbd8y
-
MD5
85b7a0e8cdee68bca806fc45948c2d82
-
SHA1
9b07766286667e6444c93e86d833a426a5d660f0
-
SHA256
4261cc05a8c4ecaf1605ef931397a4d97cc12fe38738a4f6016c3695aa2c571f
-
SHA512
2b96e5ae7597ea50255f615a29a7fe62dbfb16616aa02135b38223d40ccdf32b0c29d66ac8296449ce34fbcf5cc12ed16b617a4afe8649e0ba1bebd78d064213
-
SSDEEP
24576:cCwdv9Xe5XTlreQU99NRvxZKZcxRYjMIioPZcjdNN+60Dzgv4HBd:zwdvQlTl05JEZcPYjMIZRcZNN+6ozgvC
Static task
static1
Behavioral task
behavioral1
Sample
4261cc05a8c4ecaf1605ef931397a4d97cc12fe38738a4f6016c3695aa2c571f.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
4261cc05a8c4ecaf1605ef931397a4d97cc12fe38738a4f6016c3695aa2c571f.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral3
Sample
4261cc05a8c4ecaf1605ef931397a4d97cc12fe38738a4f6016c3695aa2c571f.apk
Resource
android-x86-arm-20220823-en
Malware Config
Extracted
octo
https://s22231232fdnsjds.top/PArhFzp5sG2sN/
https://s32231232fdnsjds.top/PArhFzp5sG2sN/
https://s42231232fdnsjds.top/PArhFzp5sG2sN/
Targets
-
-
Target
4261cc05a8c4ecaf1605ef931397a4d97cc12fe38738a4f6016c3695aa2c571f
-
Size
1.4MB
-
MD5
85b7a0e8cdee68bca806fc45948c2d82
-
SHA1
9b07766286667e6444c93e86d833a426a5d660f0
-
SHA256
4261cc05a8c4ecaf1605ef931397a4d97cc12fe38738a4f6016c3695aa2c571f
-
SHA512
2b96e5ae7597ea50255f615a29a7fe62dbfb16616aa02135b38223d40ccdf32b0c29d66ac8296449ce34fbcf5cc12ed16b617a4afe8649e0ba1bebd78d064213
-
SSDEEP
24576:cCwdv9Xe5XTlreQU99NRvxZKZcxRYjMIioPZcjdNN+60Dzgv4HBd:zwdvQlTl05JEZcPYjMIZRcZNN+6ozgvC
Score10/10-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-