General
-
Target
20e05fdb25d77676dd98b5bb0335c68666af87906ee452f6462a62bf53fb0bc3.bin
-
Size
2.6MB
-
Sample
230826-11t1gsdf72
-
MD5
173bde5aeb511daf4ce126905a70294b
-
SHA1
50cfc99e37be3dc4cc6d120388c37ed4bc91978f
-
SHA256
20e05fdb25d77676dd98b5bb0335c68666af87906ee452f6462a62bf53fb0bc3
-
SHA512
a2575a88d11fa5062ee9b4de5aa2ae71f7a353b4ad3adbf9537ee8d4cac9d6b988830537db1a2512e23a7ea7d3ac50c2d1c32b12aa9aa31bfcc0e97a0afb00e7
-
SSDEEP
49152:4TxxtgGueRJNr6QC4l9nZF7DyERnvyP9YntuGYs6qH7+4V7+OCNqNoNP:4TxxB7Rn7CSZFDRvyCntrYs6qHiY7dCh
Static task
static1
Behavioral task
behavioral1
Sample
20e05fdb25d77676dd98b5bb0335c68666af87906ee452f6462a62bf53fb0bc3.apk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral2
Sample
20e05fdb25d77676dd98b5bb0335c68666af87906ee452f6462a62bf53fb0bc3.apk
Resource
android-x64-20230824-en
Malware Config
Extracted
octo
https://cookiliakc15.live/MTU2OWE0NzJjNGY5/
https://percys81kcac.info/MTU2OWE0NzJjNGY5/
https://dancelumn991dc.top/MTU2OWE0NzJjNGY5/
https://tv1ed54je1ws.cc/MTU2OWE0NzJjNGY5/
https://63651iz40cio.biz/MTU2OWE0NzJjNGY5/
Targets
-
-
Target
20e05fdb25d77676dd98b5bb0335c68666af87906ee452f6462a62bf53fb0bc3.bin
-
Size
2.6MB
-
MD5
173bde5aeb511daf4ce126905a70294b
-
SHA1
50cfc99e37be3dc4cc6d120388c37ed4bc91978f
-
SHA256
20e05fdb25d77676dd98b5bb0335c68666af87906ee452f6462a62bf53fb0bc3
-
SHA512
a2575a88d11fa5062ee9b4de5aa2ae71f7a353b4ad3adbf9537ee8d4cac9d6b988830537db1a2512e23a7ea7d3ac50c2d1c32b12aa9aa31bfcc0e97a0afb00e7
-
SSDEEP
49152:4TxxtgGueRJNr6QC4l9nZF7DyERnvyP9YntuGYs6qH7+4V7+OCNqNoNP:4TxxB7Rn7CSZFDRvyCntrYs6qHiY7dCh
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-