General
-
Target
com.nextobjectygy.apk
-
Size
1.4MB
-
Sample
230828-k4z3xaba82
-
MD5
849658d94aad072a207ae3d40dcb7027
-
SHA1
b9444c828e6e4137603bec985fb6709e74e965c3
-
SHA256
4662160d5be3dd7b23547e04cd3cde493270181b00c5753a96f4fa7223e79572
-
SHA512
1f29e4830b1ec63da4d50e874746e1a28e548a1f3048e178cb1af507d28b0c9cbff833638047ff5a2e9505dcd3018ff1a459f82a0fb600e07031a0d7d0413dc9
-
SSDEEP
24576:i9Lk/AmN92tAQ88vLwBHVv2CB2akhR6Qf9cGE7XtgZODZH7mqHmfJFMAE4KvASw:bj2tAdggb2akhRFC7XiZGZbmqGBFMAES
Static task
static1
Behavioral task
behavioral1
Sample
com.nextobjectygy.apk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral2
Sample
com.nextobjectygy.apk
Resource
android-x64-arm64-20230824-en
Behavioral task
behavioral3
Sample
license.html
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
license.html
Resource
win10v2004-20230703-en
Malware Config
Extracted
octo
https://29p0jb1nyxmt.biz/MTU2OWE0NzJjNGY5/
https://fmri3i4567ng.biz/MTU2OWE0NzJjNGY5/
https://ahs8a4mz8ehq.online/MTU2OWE0NzJjNGY5/
https://518tudu7579h.xyz/MTU2OWE0NzJjNGY5/
https://4jsi8qj3203u.org/MTU2OWE0NzJjNGY5/
https://4n51yg9firr3.site/MTU2OWE0NzJjNGY5/
https://0eto0mhk6g7b.top/MTU2OWE0NzJjNGY5/
https://icbm5s5oj028.xyz/MTU2OWE0NzJjNGY5/
https://yjf241z0uu75.info/MTU2OWE0NzJjNGY5/
https://wanrflitrnvn.asia/MTU2OWE0NzJjNGY5/
https://tv1ed54je1ws.cc/MTU2OWE0NzJjNGY5/
https://63651iz40cio.biz/MTU2OWE0NzJjNGY5/
Targets
-
-
Target
com.nextobjectygy.apk
-
Size
1.4MB
-
MD5
849658d94aad072a207ae3d40dcb7027
-
SHA1
b9444c828e6e4137603bec985fb6709e74e965c3
-
SHA256
4662160d5be3dd7b23547e04cd3cde493270181b00c5753a96f4fa7223e79572
-
SHA512
1f29e4830b1ec63da4d50e874746e1a28e548a1f3048e178cb1af507d28b0c9cbff833638047ff5a2e9505dcd3018ff1a459f82a0fb600e07031a0d7d0413dc9
-
SSDEEP
24576:i9Lk/AmN92tAQ88vLwBHVv2CB2akhR6Qf9cGE7XtgZODZH7mqHmfJFMAE4KvASw:bj2tAdggb2akhRFC7XiZGZbmqGBFMAES
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-
-
-
Target
license.html
-
Size
30KB
-
MD5
a095d4be2768cb6d37f9aa2de90a8a67
-
SHA1
2c87de9a26cf1ee17d701c333f088db314b1bce1
-
SHA256
30d2be0e050b7f1ec5e390326cefedb6e4a6304f5e2a623d0f7678cb67ff308b
-
SHA512
0ec91a396b39029ec6585215e777495d97e72191438ec37d93e203931a1ac79b1a966e201b9b92982439e3d372f82af98a64914647464d30e1f7f3ab8a558998
-
SSDEEP
768:/03s/uZ7je9IeMkkEdgC3BOgNMXUgPGaMx6NzJhCgaZpGgPGaxvam:/0c/uZ7je9IeMFIgeOgNMXUg6x6NzJhu
Score1/10 -