Resubmissions
03-11-2023 03:44
231103-eapr7ade77 1014-08-2023 23:16
230814-28586afg99 1014-08-2023 23:14
230814-28bpjshh6t 1014-08-2023 23:13
230814-27c6zsfg95 1014-08-2023 04:43
230814-fcfsqshe37 1014-08-2023 04:42
230814-fbpz1she28 1013-08-2023 13:51
230813-q5sccach63 1013-07-2023 06:05
230713-gtdv5sfe43 10General
-
Target
com.amvery4.apk
-
Size
1.7MB
-
Sample
230814-fbpz1she28
-
MD5
25d99eea253d09f79fb4b8d39364ed8d
-
SHA1
8d923163764cc12fc287d81a718b4533e08f2fe9
-
SHA256
11dcd47ea09e8c1efe551e1832c7aeea810dce127f78299fce8d72a638fd9f51
-
SHA512
c82abf598ad8d3ac817c817496b8edeb0672d57a7771f7f707598a7c6d1ead5e282170c6da2f467b66e06f89020ab7152e6936b6b9a0c947805a55b34e9b3e25
-
SSDEEP
24576:VuNlJrpZQO3cf8Flg0f4dpDWRghaJMpv2uQOdPq0ZmARC6LD6RCaEABDMyZF:2j4M4/a+haJqv2uQOzZ2RCaEABYCF
Static task
static1
Behavioral task
behavioral1
Sample
com.amvery4.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral2
Sample
com.amvery4.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral3
Sample
com.amvery4.apk
Resource
android-x86-arm-20230621-en
Malware Config
Extracted
octo
https://176.113.115.110/YjcyMWYzZjc5OTUy/
https://31fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://32fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://33fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://34fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://35fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://36fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://37fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://38fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://39fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://40fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://41fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://42fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://43fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://44fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://45fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://46fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://47fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://48fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://49fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://50fdghhoo11.com/YjcyMWYzZjc5OTUy/
https://15.235.143.105/YjcyMWYzZjc5OTUy/
https://31fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://32fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://33fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://34fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://35fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://36fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://37fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://38fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://39fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://40fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://41fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://42fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://43fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://44fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://45fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://46fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://47fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://48fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://49fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://50fdghhoo11.top/YjcyMWYzZjc5OTUy/
https://simba1.sg/YjcyMWYzZjc5OTUy/
Targets
-
-
Target
com.amvery4.apk
-
Size
1.7MB
-
MD5
25d99eea253d09f79fb4b8d39364ed8d
-
SHA1
8d923163764cc12fc287d81a718b4533e08f2fe9
-
SHA256
11dcd47ea09e8c1efe551e1832c7aeea810dce127f78299fce8d72a638fd9f51
-
SHA512
c82abf598ad8d3ac817c817496b8edeb0672d57a7771f7f707598a7c6d1ead5e282170c6da2f467b66e06f89020ab7152e6936b6b9a0c947805a55b34e9b3e25
-
SSDEEP
24576:VuNlJrpZQO3cf8Flg0f4dpDWRghaJMpv2uQOdPq0ZmARC6LD6RCaEABDMyZF:2j4M4/a+haJqv2uQOzZ2RCaEABYCF
Score10/10-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-