General
-
Target
9a390bfbdfee8f20a9623886979af54445e37b67df07049ee1485b90149b113f
-
Size
530KB
-
Sample
231220-k3nngshdc9
-
MD5
261053d2c07414137a16248217d1a928
-
SHA1
a87aeebf50f651289208bc145b0ba9f86e61e562
-
SHA256
9a390bfbdfee8f20a9623886979af54445e37b67df07049ee1485b90149b113f
-
SHA512
605e95866fed20a433a8a9ad3eb399d8f5bbb8e99dcd7c19ce427f5f3392a68090527666c7cb2916e44c612aa24e65a0e7c94376fde128e03318c270707b0a22
-
SSDEEP
12288:CW4XLYBx+9wnPskSpgsH/SlnnPwstaTdNKDUrSGYgA4KfXrwnT2Wjfig:FoYr+9wnPskSpd/An3cb26uwTl
Static task
static1
Behavioral task
behavioral1
Sample
9a390bfbdfee8f20a9623886979af54445e37b67df07049ee1485b90149b113f.apk
Malware Config
Extracted
octo
https://24fdghhoo1.top/doc/
https://25fdghhoo1.top/doc/
https://26fdghhoo1.top/doc/
https://27fdghhoo1.top/doc/
https://28fdghhoo1.top/doc/
https://29fdghhoo1.top/doc/
https://210fdghhoo1.top/doc/
https://211fdghhoo1.top/doc/
https://122fdghhoo1.top/doc/
https://123fdghhoo1.top/doc/
https://124fdghhoo1.top/doc/
https://125fdghhoo1.top/doc/
https://126fdghhoo1.top/doc/
https://127fdghhoo1.top/doc/
https://128fdghhoo1.top/doc/
https://129fdghhoo1.top/doc/
https://220fdghhoo1.top/doc/
https://234fdghhoo1.top/doc/
https://235fdghhoo1.top/doc/
https://236fdghhoo1.top/doc/
https://237fdghhoo1.top/doc/
https://238fdghhoo1.top/doc/
https://239fdghhoo1.top/doc/
https://2310fdghhoo1.top/doc/
https://2311fdghhoo1.top/doc/
https://1322fdghhoo1.top/doc/
https://1323fdghhoo1.top/doc/
https://1324fdghhoo1.top/doc/
https://1325fdghhoo1.top/doc/
https://1326fdghhoo1.top/doc/
https://1327fdghhoo1.top/doc/
https://1328fdghhoo1.top/doc/
https://1329fdghhoo1.top/doc/
https://2320fdghhoo1.top/doc/
Targets
-
-
Target
9a390bfbdfee8f20a9623886979af54445e37b67df07049ee1485b90149b113f
-
Size
530KB
-
MD5
261053d2c07414137a16248217d1a928
-
SHA1
a87aeebf50f651289208bc145b0ba9f86e61e562
-
SHA256
9a390bfbdfee8f20a9623886979af54445e37b67df07049ee1485b90149b113f
-
SHA512
605e95866fed20a433a8a9ad3eb399d8f5bbb8e99dcd7c19ce427f5f3392a68090527666c7cb2916e44c612aa24e65a0e7c94376fde128e03318c270707b0a22
-
SSDEEP
12288:CW4XLYBx+9wnPskSpgsH/SlnnPwstaTdNKDUrSGYgA4KfXrwnT2Wjfig:FoYr+9wnPskSpd/An3cb26uwTl
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-