General
-
Target
GooglePlay23Update.apk
-
Size
527KB
-
Sample
230515-qw8mzaea5v
-
MD5
606b94fa8407316bcddaab6c35b64bc8
-
SHA1
77227e9a1d78d2968f07f6d4be63811a2333bd16
-
SHA256
32bd4e699c237655c164e36c3fe83d1a9c14b5218aa42b82bf962254e804b0a3
-
SHA512
0ea99a7967212f574dd490dea41af2e1c9686426318804f5b060baf1d60ea08a7d2efa781b80e656a4764a9d86ef57eeb5b8df09871d1fff64d703edbc94ec2f
-
SSDEEP
12288:3oLyYS1nveZfhtfLsRyYgO/jgs38BoCGpFuN++1xbdV7YQB:wyYS1vgNe/jg28BdcuQsxbgQB
Static task
static1
Behavioral task
behavioral1
Sample
GooglePlay23Update.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
GooglePlay23Update.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral3
Sample
GooglePlay23Update.apk
Resource
android-x86-arm-20220823-en
Malware Config
Extracted
octo
https://2fdghhoo11.top/doc/
https://3fdghhoo11.top/doc/
https://4fdghhoo11.top/doc/
https://5fdghhoo11.top/doc/
https://6fdghhoo11.top/doc/
https://7fdghhoo11.top/doc/
https://8fdghhoo11.top/doc/
https://9fdghhoo11.top/doc/
https://10fdghhoo11.top/doc/
https://11fdghhoo11.top/doc/
https://12fdghhoo11.top/doc/
https://13fdghhoo11.top/doc/
https://14fdghhoo11.top/doc/
https://15fdghhoo11.top/doc/
https://16fdghhoo11.top/doc/
https://17fdghhoo11.top/doc/
https://18fdghhoo11.top/doc/
https://19fdghhoo11.top/doc/
https://20fdghhoo11.top/doc/
https://21fdghhoo11.top/doc/
https://23fdghhoo11.top/doc/
https://24fdghhoo11.top/doc/
https://25fdghhoo11.top/doc/
https://26fdghhoo11.top/doc/
https://27fdghhoo11.top/doc/
https://28fdghhoo11.top/doc/
https://29fdghhoo11.top/doc/
https://30fdghhoo11.top/doc/
Targets
-
-
Target
GooglePlay23Update.apk
-
Size
527KB
-
MD5
606b94fa8407316bcddaab6c35b64bc8
-
SHA1
77227e9a1d78d2968f07f6d4be63811a2333bd16
-
SHA256
32bd4e699c237655c164e36c3fe83d1a9c14b5218aa42b82bf962254e804b0a3
-
SHA512
0ea99a7967212f574dd490dea41af2e1c9686426318804f5b060baf1d60ea08a7d2efa781b80e656a4764a9d86ef57eeb5b8df09871d1fff64d703edbc94ec2f
-
SSDEEP
12288:3oLyYS1nveZfhtfLsRyYgO/jgs38BoCGpFuN++1xbdV7YQB:wyYS1vgNe/jg28BdcuQsxbgQB
Score10/10-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-