General
-
Target
83aa50ea8f4810c7e4090b1a1fd4982fff75ca479aaf094b0cc5134831e985b6.bin
-
Size
541KB
-
Sample
240530-1wr1bsah8v
-
MD5
3b6a6ee09dda79e1edc3daafae72ba4e
-
SHA1
efb2a1287df11e480c7b178897d815eb80f5d868
-
SHA256
83aa50ea8f4810c7e4090b1a1fd4982fff75ca479aaf094b0cc5134831e985b6
-
SHA512
165a2acdba98ba1aa37659edf7d42561d86ad8f3eb11aa510f19cb28f38e2e9b07cc056ef8b14acc0410073d1d7081ea4b3807372b71be74e72bc10c102285a3
-
SSDEEP
12288:0gulg4BU85CC6tHrcqYf/05djRrrRrBmNW2kro29IqAoZM/jpLgcsVioi1n/:0gu2gLHuUXspRNkDkk29hSGVYoi1n/
Static task
static1
Behavioral task
behavioral1
Sample
83aa50ea8f4810c7e4090b1a1fd4982fff75ca479aaf094b0cc5134831e985b6.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
83aa50ea8f4810c7e4090b1a1fd4982fff75ca479aaf094b0cc5134831e985b6.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Extracted
octo
https://moneyeuroland.net/MmI1M2ZiMGRmODEy/
https://moneyeurolandbebek.net/MmI1M2ZiMGRmODEy/
https://moneyeurolandscans.net/MmI1M2ZiMGRmODEy/
https://moneyeurolanddelicim.net/MmI1M2ZiMGRmODEy/
https://moneyeurolandbabis.net/MmI1M2ZiMGRmODEy/
https://moeurolandbabisde.net/MmI1M2ZiMGRmODEy/
https://eyeurolandbabisce.net/MmI1M2ZiMGRmODEy/
https://morolandbabisge.net/MmI1M2ZiMGRmODEy/
Targets
-
-
Target
83aa50ea8f4810c7e4090b1a1fd4982fff75ca479aaf094b0cc5134831e985b6.bin
-
Size
541KB
-
MD5
3b6a6ee09dda79e1edc3daafae72ba4e
-
SHA1
efb2a1287df11e480c7b178897d815eb80f5d868
-
SHA256
83aa50ea8f4810c7e4090b1a1fd4982fff75ca479aaf094b0cc5134831e985b6
-
SHA512
165a2acdba98ba1aa37659edf7d42561d86ad8f3eb11aa510f19cb28f38e2e9b07cc056ef8b14acc0410073d1d7081ea4b3807372b71be74e72bc10c102285a3
-
SSDEEP
12288:0gulg4BU85CC6tHrcqYf/05djRrrRrBmNW2kro29IqAoZM/jpLgcsVioi1n/:0gu2gLHuUXspRNkDkk29hSGVYoi1n/
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Requests modifying system settings.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-