General
-
Target
2b1ca185419b6048eb224da987a54a0651f54bec77037c0ecf4c71aa06c8b0d8.bin
-
Size
3.2MB
-
Sample
240531-3jsr7shf2y
-
MD5
4f3a028f9d6aaafbae2bde4020292e21
-
SHA1
810f7ff64f4c07a09316760ff33db8a6ac30b4d8
-
SHA256
2b1ca185419b6048eb224da987a54a0651f54bec77037c0ecf4c71aa06c8b0d8
-
SHA512
eb94c6f1b83bb6c30bc39c893b5e648f002f8c14ea4e28c83dde768c1363be159a469879b0227eee1bd8717b47ff37f96ca132a200fbbe0b4a35bf879453422d
-
SSDEEP
98304:Hz8p3PJY9jge83Qdd+Zfbopw8twD1Bs06rOA2:Hz8J8geHuWIZ6D2
Static task
static1
Behavioral task
behavioral1
Sample
2b1ca185419b6048eb224da987a54a0651f54bec77037c0ecf4c71aa06c8b0d8.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
2b1ca185419b6048eb224da987a54a0651f54bec77037c0ecf4c71aa06c8b0d8.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Extracted
octo
https://45.93.20.118:7117/gate/
Targets
-
-
Target
2b1ca185419b6048eb224da987a54a0651f54bec77037c0ecf4c71aa06c8b0d8.bin
-
Size
3.2MB
-
MD5
4f3a028f9d6aaafbae2bde4020292e21
-
SHA1
810f7ff64f4c07a09316760ff33db8a6ac30b4d8
-
SHA256
2b1ca185419b6048eb224da987a54a0651f54bec77037c0ecf4c71aa06c8b0d8
-
SHA512
eb94c6f1b83bb6c30bc39c893b5e648f002f8c14ea4e28c83dde768c1363be159a469879b0227eee1bd8717b47ff37f96ca132a200fbbe0b4a35bf879453422d
-
SSDEEP
98304:Hz8p3PJY9jge83Qdd+Zfbopw8twD1Bs06rOA2:Hz8J8geHuWIZ6D2
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Requests modifying system settings.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-