General
-
Target
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92.bin
-
Size
541KB
-
Sample
230720-1a2mmsag34
-
MD5
0331356b4fd152b94482b2b136a63c7a
-
SHA1
6182861e23b411f28b79325bb113aa2c0526482f
-
SHA256
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92
-
SHA512
2e2dec0e1abdd1d20d30dec466ee5f41fdcdc7ce965ff5347ea4982b4925ea9dbf5744164b570b2f5490cd957d2fd79d1e67bc3b9962f3f852100396dba7b203
-
SSDEEP
12288:UykRqYxsL++RDHFAe3mHwBKNU1xVBcKY2l6HiqcT+aQaLDZ:UXfxfErF5S9UHVBrY50HQah
Static task
static1
Behavioral task
behavioral1
Sample
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92.apk
Resource
android-x64-20230621-en
Malware Config
Extracted
octo
https://eses432532s.xyz/ZTIyNTVmMmE1NzNl/
https://3ses432532s.xyz/ZTIyNTVmMmE1NzNl/
https://5ses432532s.xyz/ZTIyNTVmMmE1NzNl/
https://4ses432532s.xyz/ZTIyNTVmMmE1NzNl/
https://logite234s.xyz/ZTIyNTVmMmE1NzNl/
https://logit32532s.xyz/ZTIyNTVmMmE1NzNl/
https://logits432532s.xyz/ZTIyNTVmMmE1NzNl/
https://logites432532s.xyz/ZTIyNTVmMmE1NzNl/
https://2logite234s.xyz/ZTIyNTVmMmE1NzNl/
https://5logit32532s.xyz/ZTIyNTVmMmE1NzNl/
https://8logits432532s.xyz/ZTIyNTVmMmE1NzNl/
https://1logites432532s.xyz/ZTIyNTVmMmE1NzNl/
Targets
-
-
Target
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92.bin
-
Size
541KB
-
MD5
0331356b4fd152b94482b2b136a63c7a
-
SHA1
6182861e23b411f28b79325bb113aa2c0526482f
-
SHA256
ac304ed2f1ffc973ebf9cad35468473310c8a3472833cec5dbbc65f5541d8b92
-
SHA512
2e2dec0e1abdd1d20d30dec466ee5f41fdcdc7ce965ff5347ea4982b4925ea9dbf5744164b570b2f5490cd957d2fd79d1e67bc3b9962f3f852100396dba7b203
-
SSDEEP
12288:UykRqYxsL++RDHFAe3mHwBKNU1xVBcKY2l6HiqcT+aQaLDZ:UXfxfErF5S9UHVBrY50HQah
Score10/10-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Uses Crypto APIs (Might try to encrypt user data).
-