General
-
Target
0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8.bin
-
Size
541KB
-
Sample
240602-198j8sab87
-
MD5
368f347c4a7972eff3604d15f8dce788
-
SHA1
769ba40c539b97c913020e9dc53581c3429f1eb2
-
SHA256
0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8
-
SHA512
dc28328e87b986ad7035007f927da955d4be6120587232a13cac4c76939db7965d63cdbf66b449035c3707c79ae9420696aba64cf4bfdb800e81f0ee588e771f
-
SSDEEP
12288:Lxd51i8+fdTTahTHvyHNGcdLnwq+tyJ1QuY5kDLW5Y58nx:lCZTCCNJdLnwDApDLFOnx
Static task
static1
Behavioral task
behavioral1
Sample
0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8.apk
Resource
android-x64-20240514-en
Malware Config
Extracted
octo
https://maviderinkalem.shop/NzUxNjc3YmZjNTNl/
https://karayipkalanda.shop/NzUxNjc3YmZjNTNl/
https://maviceketler.shop/NzUxNjc3YmZjNTNl/
https://martilarlaaraba.shop/NzUxNjc3YmZjNTNl/
https://kafaneredeciler2.shop/NzUxNjc3YmZjNTNl/
https://mavidlimanda.shop/NzUxNjc3YmZjNTNl/
https://mavidendercam.com/NzUxNjc3YmZjNTNl/
https://mavideritarak2.shop/NzUxNjc3YmZjNTNl/
https://beyazgelinlik12.shop/NzUxNjc3YmZjNTNl/
https://mahmatagada.top/NzUxNjc3YmZjNTNl/
https://maviderinasfkalem1231.shop/NzUxNjc3YmZjNTNl/
https://hadiordangel23.net/NzUxNjc3YmZjNTNl/
https://martilarlaaraba2412.shop/NzUxNjc3YmZjNTNl/
https://kafaneredecilersda2.shop/NzUxNjc3YmZjNTNl/
https://mavidlimanda123.shop/NzUxNjc3YmZjNTNl/
https://mavidendercamlar2.com/NzUxNjc3YmZjNTNl/
Targets
-
-
Target
0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8.bin
-
Size
541KB
-
MD5
368f347c4a7972eff3604d15f8dce788
-
SHA1
769ba40c539b97c913020e9dc53581c3429f1eb2
-
SHA256
0527acf5d7a3cd7cd4e37bb6515c423c4045b13a7e3a74548f4c6eb6ec0541c8
-
SHA512
dc28328e87b986ad7035007f927da955d4be6120587232a13cac4c76939db7965d63cdbf66b449035c3707c79ae9420696aba64cf4bfdb800e81f0ee588e771f
-
SSDEEP
12288:Lxd51i8+fdTTahTHvyHNGcdLnwq+tyJ1QuY5kDLW5Y58nx:lCZTCCNJdLnwDApDLFOnx
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Requests modifying system settings.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-