General
-
Target
6153966e76e62c9a812601469553a291f1bc1f26c9e7ff56f0d3e0a28d6cf8ce.bin
-
Size
1.5MB
-
Sample
230920-r7rn9sgh6z
-
MD5
44e83dd5257260cf5c9e85100c016116
-
SHA1
22dc9c4250b9fdb837573308b3a2a6755f9d4b36
-
SHA256
6153966e76e62c9a812601469553a291f1bc1f26c9e7ff56f0d3e0a28d6cf8ce
-
SHA512
3cf9e9fa46a669bcc996c9b58883108bc463e0a3e73aeeb53387ec17c579fc8b18ac18c55201255571a5d853c4cf77943d4e38752091753fb6abc9df99f323ed
-
SSDEEP
24576:a7caN4hTiPRj7yphSSVxBLTDWXXaZODZH7mqNThUIHAE4KvAS1Q:aoaETgy//VnnWXKZGZbmqhqIHAE4KoSW
Static task
static1
Behavioral task
behavioral1
Sample
6153966e76e62c9a812601469553a291f1bc1f26c9e7ff56f0d3e0a28d6cf8ce.apk
Resource
android-x86-arm-20230831-en
Malware Config
Extracted
octo
https://blessedik591.info/MTU2OWE0NzJjNGY5/
https://cm603lzeyxdw.site/MTU2OWE0NzJjNGY5/
https://cm603lzeyxdw1.site/MTU2OWE0NzJjNGY5/
https://arw2he7x57wp.pw/MTU2OWE0NzJjNGY5/
https://9r8i1u84t2gp.online/MTU2OWE0NzJjNGY5/
https://cm603lzeyxdw.biz/MTU2OWE0NzJjNGY5/
https://arw2he7x57wp1.pw/MTU2OWE0NzJjNGY5/
https://9r8i1u84t2gp1.online/MTU2OWE0NzJjNGY5/
https://cm603lzeyxdw.space/MTU2OWE0NzJjNGY5/
https://5a9udxg6l6gd.su/MTU2OWE0NzJjNGY5/
https://f2kic1nam25n81k.cc/MTU2OWE0NzJjNGY5/
https://maza5rra11vti251mca.info/MTU2OWE0NzJjNGY5/
https://cleverk21da912mca.live/MTU2OWE0NzJjNGY5/
https://zazarazgok7215vor1.pro/MTU2OWE0NzJjNGY5/
Targets
-
-
Target
6153966e76e62c9a812601469553a291f1bc1f26c9e7ff56f0d3e0a28d6cf8ce.bin
-
Size
1.5MB
-
MD5
44e83dd5257260cf5c9e85100c016116
-
SHA1
22dc9c4250b9fdb837573308b3a2a6755f9d4b36
-
SHA256
6153966e76e62c9a812601469553a291f1bc1f26c9e7ff56f0d3e0a28d6cf8ce
-
SHA512
3cf9e9fa46a669bcc996c9b58883108bc463e0a3e73aeeb53387ec17c579fc8b18ac18c55201255571a5d853c4cf77943d4e38752091753fb6abc9df99f323ed
-
SSDEEP
24576:a7caN4hTiPRj7yphSSVxBLTDWXXaZODZH7mqNThUIHAE4KvAS1Q:aoaETgy//VnnWXKZGZbmqhqIHAE4KoSW
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-