General
-
Target
a427bd8c697a0776f06974ab1927a2c31acb30b9159066f4bc1dacbdce51253a.bin
-
Size
541KB
-
Sample
230722-s1mx6sbf8v
-
MD5
4fb1980fa9d8c1d3ed144bd020122143
-
SHA1
bc0b7eda34203b83f4050e81d1131e542a130c5d
-
SHA256
a427bd8c697a0776f06974ab1927a2c31acb30b9159066f4bc1dacbdce51253a
-
SHA512
1fd9818247f7821b15a516ff199607dd55bfef07910c925eabe6dd63e395903ba00b21d2034921ccb24d1a8c562f58592b3ebd1918880c09f8d0d5f3ea5f6b22
-
SSDEEP
12288:bggw22T5MSVf+xsXfrCPACF3jYitbQUdQgDC4ssIq2FUCZFn/:Ut2cZVfVXfHCF3jYitFQgDC5JfFZn/
Static task
static1
Behavioral task
behavioral1
Sample
a427bd8c697a0776f06974ab1927a2c31acb30b9159066f4bc1dacbdce51253a.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
a427bd8c697a0776f06974ab1927a2c31acb30b9159066f4bc1dacbdce51253a.apk
Resource
android-x64-arm64-20230621-en
Malware Config
Extracted
octo
https://193.42.32.180/ZjU3NWNhYzE5Mzhm/
https://saldirmorukss222.net/ZjU3NWNhYzE5Mzhm/
https://saldirmorukss122.net/ZjU3NWNhYzE5Mzhm/
https://saldirmoruk4ss22.net/ZjU3NWNhYzE5Mzhm/
https://saldirmoruks6s22.net/ZjU3NWNhYzE5Mzhm/
https://saldirmoruk7ss22.net/ZjU3NWNhYzE5Mzhm/
https://saldirmoruks8s22.net/ZjU3NWNhYzE5Mzhm/
https://saldirmorukss2322.net/ZjU3NWNhYzE5Mzhm/
https://saldirmoruksas282.net/ZjU3NWNhYzE5Mzhm/
Targets
-
-
Target
a427bd8c697a0776f06974ab1927a2c31acb30b9159066f4bc1dacbdce51253a.bin
-
Size
541KB
-
MD5
4fb1980fa9d8c1d3ed144bd020122143
-
SHA1
bc0b7eda34203b83f4050e81d1131e542a130c5d
-
SHA256
a427bd8c697a0776f06974ab1927a2c31acb30b9159066f4bc1dacbdce51253a
-
SHA512
1fd9818247f7821b15a516ff199607dd55bfef07910c925eabe6dd63e395903ba00b21d2034921ccb24d1a8c562f58592b3ebd1918880c09f8d0d5f3ea5f6b22
-
SSDEEP
12288:bggw22T5MSVf+xsXfrCPACF3jYitbQUdQgDC4ssIq2FUCZFn/:Ut2cZVfVXfHCF3jYitFQgDC5JfFZn/
Score10/10-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Uses Crypto APIs (Might try to encrypt user data).
-