General
-
Target
4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4
-
Size
1.7MB
-
Sample
230928-lbbehsaa8t
-
MD5
d66860f4fbd02fdbc452b9e3fabdfe71
-
SHA1
332c7fa9260426e33e60ff5619ba2dbf630c60e8
-
SHA256
4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4
-
SHA512
56c7025c23af5eb43a3db8f848f477d8b05d4dd68d86e3bb39756ef701202cc9a53645bb022741491efb8347513db10743f88aef6e1e2862d0ca9265d231abab
-
SSDEEP
49152:g7meK0meZdvS1S8ApovsEY1xMjhSDCaEA3DI:cmeZmUAXAoYkNwCaz3DI
Static task
static1
Behavioral task
behavioral1
Sample
4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4.apk
Resource
android-x64-20230831-en
Malware Config
Extracted
octo
https://daniel.osborne.chickenkiller.com/YjJjM2M0NDc4ZjBj/
https://laural-plath.chickenkiller.com/YjJjM2M0NDc4ZjBj/
https://gabriela.saunders.crabdance.com/YjJjM2M0NDc4ZjBj/
https://James-beekman.jumpingcrab.com/YjJjM2M0NDc4ZjBj/
https://brian-tallman.twilightparadox.com/YjJjM2M0NDc4ZjBj/
Targets
-
-
Target
4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4
-
Size
1.7MB
-
MD5
d66860f4fbd02fdbc452b9e3fabdfe71
-
SHA1
332c7fa9260426e33e60ff5619ba2dbf630c60e8
-
SHA256
4dd2e25f45a10f9b1d622143bd197a54f9c0d516eaa3f0d8bddb7c189cdda4d4
-
SHA512
56c7025c23af5eb43a3db8f848f477d8b05d4dd68d86e3bb39756ef701202cc9a53645bb022741491efb8347513db10743f88aef6e1e2862d0ca9265d231abab
-
SSDEEP
49152:g7meK0meZdvS1S8ApovsEY1xMjhSDCaEA3DI:cmeZmUAXAoYkNwCaz3DI
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Uses Crypto APIs (Might try to encrypt user data).
-