General
-
Target
8b69dfe648fb940a861f3176dd88a0f359219faa3c2c293fec6b2197ec23cece
-
Size
1.7MB
-
Sample
231220-g5x36afecp
-
MD5
f1b2a472b9ac97598774b6a04c925eb2
-
SHA1
c34b0fc21f163cad3a9f043e3287559a569825b9
-
SHA256
8b69dfe648fb940a861f3176dd88a0f359219faa3c2c293fec6b2197ec23cece
-
SHA512
521c9cda3b1fd05d14233e03cc2e113259d61b36ed21ab922374edaf880e11af818283fa762114f8abc656919fa937747e48883fc7bcd1b3a05a891ec7452ed5
-
SSDEEP
49152:NTRcCmKtk2tmbgkqnMokm5zWXU9kZsQkSXgwgZ:NTRcCmKtk2kgPn1km5zWX76hZ
Static task
static1
Behavioral task
behavioral1
Sample
8b69dfe648fb940a861f3176dd88a0f359219faa3c2c293fec6b2197ec23cece.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8b69dfe648fb940a861f3176dd88a0f359219faa3c2c293fec6b2197ec23cece.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
octo
https://jaffioptru.me/ZWU1ZTRhMzU1Zjdi/
https://jaffioptru.biz/ZWU1ZTRhMzU1Zjdi/
Targets
-
-
Target
8b69dfe648fb940a861f3176dd88a0f359219faa3c2c293fec6b2197ec23cece
-
Size
1.7MB
-
MD5
f1b2a472b9ac97598774b6a04c925eb2
-
SHA1
c34b0fc21f163cad3a9f043e3287559a569825b9
-
SHA256
8b69dfe648fb940a861f3176dd88a0f359219faa3c2c293fec6b2197ec23cece
-
SHA512
521c9cda3b1fd05d14233e03cc2e113259d61b36ed21ab922374edaf880e11af818283fa762114f8abc656919fa937747e48883fc7bcd1b3a05a891ec7452ed5
-
SSDEEP
49152:NTRcCmKtk2tmbgkqnMokm5zWXU9kZsQkSXgwgZ:NTRcCmKtk2kgPn1km5zWX76hZ
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-