General
-
Target
2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c.bin
-
Size
541KB
-
Sample
230826-11pqrsdf67
-
MD5
2293d21064a4547973f813478798914b
-
SHA1
5cc3611160c229aa3adce747aff504ccaaaae83a
-
SHA256
2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c
-
SHA512
aff8797636b16d9be0cf3ed4f433e61696011e0ec09551babb396cbcb50bf99bbbf51a2e32419fca33857f2f0723cec5b8162d09149e392086b5050bc3f3bad2
-
SSDEEP
12288:uljZOqGS7AUQwjG+toqQSJSbBwdAytJi+oR2xp3IYwgIe2aiV0aNwf:09Oqp7XGQQSJSwdrdpU7eo+aM
Static task
static1
Behavioral task
behavioral1
Sample
2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c.apk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral2
Sample
2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c.apk
Resource
android-x64-arm64-20230824-en
Malware Config
Extracted
octo
https://176.111.174.151/Y2NlMmYyMmYwMGI5/
https://ghost23241312.xyz/Y2NlMmYyMmYwMGI5/
https://ghost232412512.xyz/Y2NlMmYyMmYwMGI5/
https://ghost232412312.xyz/Y2NlMmYyMmYwMGI5/
https://epinciifirarda227.xyz/Y2NlMmYyMmYwMGI5/
https://epinciifirarda27.xyz/Y2NlMmYyMmYwMGI5/
https://epinciifirarda237.xyz/Y2NlMmYyMmYwMGI5/
https://epi2nciifirarda227.xyz/Y2NlMmYyMmYwMGI5/
https://epi3nciifirarda27.xyz/Y2NlMmYyMmYwMGI5/
https://epi5nciifirarda237.xyz/Y2NlMmYyMmYwMGI5/
https://idriskocovali1900.net/Y2NlMmYyMmYwMGI5/
https://idriskocovali1784.net/Y2NlMmYyMmYwMGI5/
https://idriskocovali9651.net/Y2NlMmYyMmYwMGI5/
https://idriskocovali258.net/Y2NlMmYyMmYwMGI5/
https://idriskocovali147.net/Y2NlMmYyMmYwMGI5/
Targets
-
-
Target
2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c.bin
-
Size
541KB
-
MD5
2293d21064a4547973f813478798914b
-
SHA1
5cc3611160c229aa3adce747aff504ccaaaae83a
-
SHA256
2f40e180038c05dd005d0e9a89aa1d5947729c685473349ab183212d4c63ec0c
-
SHA512
aff8797636b16d9be0cf3ed4f433e61696011e0ec09551babb396cbcb50bf99bbbf51a2e32419fca33857f2f0723cec5b8162d09149e392086b5050bc3f3bad2
-
SSDEEP
12288:uljZOqGS7AUQwjG+toqQSJSbBwdAytJi+oR2xp3IYwgIe2aiV0aNwf:09Oqp7XGQQSJSwdrdpU7eo+aM
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Uses Crypto APIs (Might try to encrypt user data).
-