General
-
Target
3a4c78e18105327c3b9af0beda2524fea74550c38ffbc575fde2c6c0d634b10a
-
Size
7.5MB
-
Sample
241009-jxnkvs1bkb
-
MD5
e6223fa4918b8751f1776d6266a151cf
-
SHA1
e97df448289904998275602a188288033631aa18
-
SHA256
3a4c78e18105327c3b9af0beda2524fea74550c38ffbc575fde2c6c0d634b10a
-
SHA512
5a2238dc243b8907b35cd9bcaa0ee9a825681df050960ea0100b11e81a9bff4ac86a5625306ce92dd0e6ea0723585b7ca2e77df7bb55c6995a91ca492a651e58
-
SSDEEP
98304:Lu4Yj7WRsk5iSRG7UVKlBJWpGBXuu8H8oXxXmwmWypvh:Lunj7WRnrJUf0AFh8coQwAvh
Static task
static1
Behavioral task
behavioral1
Sample
3a4c78e18105327c3b9af0beda2524fea74550c38ffbc575fde2c6c0d634b10a.apk
Resource
android-x64-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
3a4c78e18105327c3b9af0beda2524fea74550c38ffbc575fde2c6c0d634b10a
-
Size
7.5MB
-
MD5
e6223fa4918b8751f1776d6266a151cf
-
SHA1
e97df448289904998275602a188288033631aa18
-
SHA256
3a4c78e18105327c3b9af0beda2524fea74550c38ffbc575fde2c6c0d634b10a
-
SHA512
5a2238dc243b8907b35cd9bcaa0ee9a825681df050960ea0100b11e81a9bff4ac86a5625306ce92dd0e6ea0723585b7ca2e77df7bb55c6995a91ca492a651e58
-
SSDEEP
98304:Lu4Yj7WRsk5iSRG7UVKlBJWpGBXuu8H8oXxXmwmWypvh:Lunj7WRnrJUf0AFh8coQwAvh
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3