General
-
Target
cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3.bin
-
Size
541KB
-
Sample
230904-1wwzaabh26
-
MD5
392c9aef3ff168163f99a0669675cc63
-
SHA1
6959b63f22b5728e536de902b70c880f1908ef13
-
SHA256
cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3
-
SHA512
f26f24f83f6278fcb4b267e9949a3255a5b03bd5be176b74f43e21315d64e5b5c07c77ddc3eaf78f5f39cecc3f028a493e5ce4e10f849b39b8c2044cbb9cf11f
-
SSDEEP
12288:AYd77xNfkhSme6PFIJefUnZBeB415sBuqOdB5aGQp5gHtxnC:AYd7zfkEmepJkUZBI41mcLa9itxnC
Static task
static1
Behavioral task
behavioral1
Sample
cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3.apk
Resource
android-x64-arm64-20230831-en
Malware Config
Extracted
octo
https://keplistensan.site/YWRhZjAxNGM1YjFh/
https://ikranjsfyu.space/YWRhZjAxNGM1YjFh/
https://ujsayhhfsakl.fun/YWRhZjAxNGM1YjFh/
https://hduuooasdj.website/YWRhZjAxNGM1YjFh/
https://pkasjjfoosa.host/YWRhZjAxNGM1YjFh/
Targets
-
-
Target
cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3.bin
-
Size
541KB
-
MD5
392c9aef3ff168163f99a0669675cc63
-
SHA1
6959b63f22b5728e536de902b70c880f1908ef13
-
SHA256
cd81f567e4179a5c1aa48d117dd702afcce94e567d8a82a049d691cded58a4a3
-
SHA512
f26f24f83f6278fcb4b267e9949a3255a5b03bd5be176b74f43e21315d64e5b5c07c77ddc3eaf78f5f39cecc3f028a493e5ce4e10f849b39b8c2044cbb9cf11f
-
SSDEEP
12288:AYd77xNfkhSme6PFIJefUnZBeB415sBuqOdB5aGQp5gHtxnC:AYd7zfkEmepJkUZBI41mcLa9itxnC
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-