General
-
Target
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e.bin
-
Size
541KB
-
Sample
231009-1z9dsaag68
-
MD5
c214de79730dd70ab52a43621404fb93
-
SHA1
7e983ae4ced9acc5da73f040f252ba61a759dd8c
-
SHA256
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e
-
SHA512
886e68039960666703928d46c1230dd626758a0bda227d6883c58f6300f6c716c53f9f7e5d06f0c802180894f0f77b2f806adc7e95f80bbdae0014038327820a
-
SSDEEP
12288:40TiRBZVgrda7IVdmFfK0nqqQi4WUUksOUerW87nH:4sEZVghsfEqQi/U9HrWenH
Static task
static1
Behavioral task
behavioral1
Sample
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e.apk
Resource
android-x64-arm64-20230831-en
Malware Config
Extracted
octo
https://213.109.202.154/MWMxNzg0YzJjZTVh/
https://yamacreklam232.net/MWMxNzg0YzJjZTVh/
https://y3macreklam232.net/MWMxNzg0YzJjZTVh/
https://y4macreklam232.net/MWMxNzg0YzJjZTVh/
https://y5macreklam232.net/MWMxNzg0YzJjZTVh/
https://y7macreklam232.net/MWMxNzg0YzJjZTVh/
https://y8macreklam232.net/MWMxNzg0YzJjZTVh/
Targets
-
-
Target
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e.bin
-
Size
541KB
-
MD5
c214de79730dd70ab52a43621404fb93
-
SHA1
7e983ae4ced9acc5da73f040f252ba61a759dd8c
-
SHA256
b4f12b179adf38adc98991b4927c544cf51ac89d7faea4185681958eed3e666e
-
SHA512
886e68039960666703928d46c1230dd626758a0bda227d6883c58f6300f6c716c53f9f7e5d06f0c802180894f0f77b2f806adc7e95f80bbdae0014038327820a
-
SSDEEP
12288:40TiRBZVgrda7IVdmFfK0nqqQi4WUUksOUerW87nH:4sEZVghsfEqQi/U9HrWenH
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Uses Crypto APIs (Might try to encrypt user data).
-