General
-
Target
056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5.bin
-
Size
541KB
-
Sample
230911-1wyg4sbg24
-
MD5
cfbb42ce764505ed033b933e60036c91
-
SHA1
a111b15f1e0d0d64d5f2947d60fcf4bb3e00bbff
-
SHA256
056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5
-
SHA512
9cf34a131d15b381f7152b1877bb0edd5bf2dbe6a895eaae18155c281cb6157fb7dbef75600d758fc28d3c824ad33d04251a702ebb27bb3bcb5f9560716e4f20
-
SSDEEP
12288:zmgiCdq8SjOiUmtyFUBzT21PvJh9EysXmVDZ+ethOXnL:zmxCdeSIJBzT+i4DZ+eDMnL
Static task
static1
Behavioral task
behavioral1
Sample
056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5.apk
Resource
android-x64-20230831-en
Malware Config
Extracted
octo
https://185.122.204.122/MDViMDU3NDYwMTBm/
https://trattotarakoniyse.com/MDViMDU3NDYwMTBm/
https://trattotarakoniyse.xyz/MDViMDU3NDYwMTBm/
https://trattotarakoniyse.net/MDViMDU3NDYwMTBm/
https://trattotarakoniconti.com/MDViMDU3NDYwMTBm/
https://trattotarakoniconti.xyz/MDViMDU3NDYwMTBm/
https://trattotarakoniconti.net/MDViMDU3NDYwMTBm/
Targets
-
-
Target
056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5.bin
-
Size
541KB
-
MD5
cfbb42ce764505ed033b933e60036c91
-
SHA1
a111b15f1e0d0d64d5f2947d60fcf4bb3e00bbff
-
SHA256
056da2d99c836172612846c84e31158c0f6ae42393517fb088c7cc9afb5a7bb5
-
SHA512
9cf34a131d15b381f7152b1877bb0edd5bf2dbe6a895eaae18155c281cb6157fb7dbef75600d758fc28d3c824ad33d04251a702ebb27bb3bcb5f9560716e4f20
-
SSDEEP
12288:zmgiCdq8SjOiUmtyFUBzT21PvJh9EysXmVDZ+ethOXnL:zmxCdeSIJBzT+i4DZ+eDMnL
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-