General
-
Target
82712f66f7c18d145873130489985de7d5559f677d34a639337ae84e6a7fc0cb
-
Size
1.7MB
-
Sample
231220-elm3qsecc5
-
MD5
cf493c943983fd7a51e91b267e399535
-
SHA1
8f22d4d1ad7fe53b6a74d8920e0f48d6b44fadad
-
SHA256
82712f66f7c18d145873130489985de7d5559f677d34a639337ae84e6a7fc0cb
-
SHA512
400f161fab51a94c31c990891d9b1f8ba305dd635d7c437ee21d5501f47fbbb3e3170cdf0de01638ac228de1cc36eaeb0cacb005a444e56f40519d25c6708c06
-
SSDEEP
49152:dhMfqZFVEbYRGcZV6CnOoWo7adivpaZRD3YgwgbL:/jVxR3LnnW5URcLn
Static task
static1
Behavioral task
behavioral1
Sample
82712f66f7c18d145873130489985de7d5559f677d34a639337ae84e6a7fc0cb.apk
Resource
android-x86-arm-20231215-en
Malware Config
Extracted
octo
https://ashfjuiwef.top/MGUyNjIwZWNlYWYw/
https://efrgtjyrefqwg.top/MGUyNjIwZWNlYWYw/
https://ugidsnvewq.top/MGUyNjIwZWNlYWYw/
https://fvbhfjdkcaasf.top/MGUyNjIwZWNlYWYw/
https://vhjfhvbjvkcvfxz.top/MGUyNjIwZWNlYWYw/
Targets
-
-
Target
82712f66f7c18d145873130489985de7d5559f677d34a639337ae84e6a7fc0cb
-
Size
1.7MB
-
MD5
cf493c943983fd7a51e91b267e399535
-
SHA1
8f22d4d1ad7fe53b6a74d8920e0f48d6b44fadad
-
SHA256
82712f66f7c18d145873130489985de7d5559f677d34a639337ae84e6a7fc0cb
-
SHA512
400f161fab51a94c31c990891d9b1f8ba305dd635d7c437ee21d5501f47fbbb3e3170cdf0de01638ac228de1cc36eaeb0cacb005a444e56f40519d25c6708c06
-
SSDEEP
49152:dhMfqZFVEbYRGcZV6CnOoWo7adivpaZRD3YgwgbL:/jVxR3LnnW5URcLn
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-