General
-
Target
bece14b4e9fd1fd8b237fdee2b0c2739a8de0f84f72c7770d90d0250fd21acbf.bin
-
Size
298KB
-
Sample
240313-1wxwkscd98
-
MD5
0cdf9620bee1ded109c511b160cfe4a3
-
SHA1
67e865c6420fa12215eb732bd180dfc6ecea8a46
-
SHA256
bece14b4e9fd1fd8b237fdee2b0c2739a8de0f84f72c7770d90d0250fd21acbf
-
SHA512
9f54a98821effe043cd4c2c58dd3cd53de4f443ab07c96c1caf5e6d2d48863efcfb4c0750227deff7f74c9f707b75f912cb94fc7f08a96237af28440767d2f47
-
SSDEEP
6144:C+SKpd5ol4JgS3r0JrkuUbHpDddCOdNR8pbNGbszlKrPI:C+SKpPoGmc0IumHpDddCOSpkslkw
Static task
static1
Behavioral task
behavioral1
Sample
bece14b4e9fd1fd8b237fdee2b0c2739a8de0f84f72c7770d90d0250fd21acbf.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
bece14b4e9fd1fd8b237fdee2b0c2739a8de0f84f72c7770d90d0250fd21acbf.apk
Resource
android-x64-20240221-en
Malware Config
Extracted
octo
https://2.57.149.238:7117/gate/
Targets
-
-
Target
bece14b4e9fd1fd8b237fdee2b0c2739a8de0f84f72c7770d90d0250fd21acbf.bin
-
Size
298KB
-
MD5
0cdf9620bee1ded109c511b160cfe4a3
-
SHA1
67e865c6420fa12215eb732bd180dfc6ecea8a46
-
SHA256
bece14b4e9fd1fd8b237fdee2b0c2739a8de0f84f72c7770d90d0250fd21acbf
-
SHA512
9f54a98821effe043cd4c2c58dd3cd53de4f443ab07c96c1caf5e6d2d48863efcfb4c0750227deff7f74c9f707b75f912cb94fc7f08a96237af28440767d2f47
-
SSDEEP
6144:C+SKpd5ol4JgS3r0JrkuUbHpDddCOdNR8pbNGbszlKrPI:C+SKpPoGmc0IumHpDddCOSpkslkw
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-