General
-
Target
1.traff23_com.useallrb_Lazada_0_crypt_aligned.apk
-
Size
1.9MB
-
Sample
230927-y5s8mseb4y
-
MD5
6552b0699c6683b9a7d905d431b14403
-
SHA1
a40c6bb1990ce78414b64bf9a2f6225e6012ee8e
-
SHA256
5ebac20a82963408b103b0e53da63fc22a15404321989a090505ee8258095423
-
SHA512
e488030c5d39ea668f8d8e4b799ce34f54eb2ecd34d1e5c36d88293137d58997bb674533d6be880cd9703ae2c6d5622d521ca8a2194e21dbc7c112f471896834
-
SSDEEP
24576:MmlR3LHA9i1J6hf+SsmW+c92P4J1dMZAMm7tAme4Z/w5gNlVYRDlYqjaOB04IB3+:zLA816famWaP4yY5RZ/wytEieLRfbfV
Static task
static1
Behavioral task
behavioral1
Sample
1.traff23_com.useallrb_Lazada_0_crypt_aligned.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
1.traff23_com.useallrb_Lazada_0_crypt_aligned.apk
Resource
android-x64-20230831-en
Malware Config
Extracted
octo
https://cm603lzeyxdw.site/MTU2OWE0NzJjNGY5/
https://cm603lzeyxdw1.site/MTU2OWE0NzJjNGY5/
https://arw2he7x57wp.pw/MTU2OWE0NzJjNGY5/
https://5a9udxg6l6gd.su/MTU2OWE0NzJjNGY5/
https://9r8i1u84t2gp.online/MTU2OWE0NzJjNGY5/
https://cm603lzeyxdw.space/MTU2OWE0NzJjNGY5/
https://cleverk21da912mca.live/MTU2OWE0NzJjNGY5/
https://zazarazgok7215vor1.pro/MTU2OWE0NzJjNGY5/
https://juf18ki1ca15ca1la.info/MTU2OWE0NzJjNGY5/
Targets
-
-
Target
1.traff23_com.useallrb_Lazada_0_crypt_aligned.apk
-
Size
1.9MB
-
MD5
6552b0699c6683b9a7d905d431b14403
-
SHA1
a40c6bb1990ce78414b64bf9a2f6225e6012ee8e
-
SHA256
5ebac20a82963408b103b0e53da63fc22a15404321989a090505ee8258095423
-
SHA512
e488030c5d39ea668f8d8e4b799ce34f54eb2ecd34d1e5c36d88293137d58997bb674533d6be880cd9703ae2c6d5622d521ca8a2194e21dbc7c112f471896834
-
SSDEEP
24576:MmlR3LHA9i1J6hf+SsmW+c92P4J1dMZAMm7tAme4Z/w5gNlVYRDlYqjaOB04IB3+:zLA816famWaP4yY5RZ/wytEieLRfbfV
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-