General
-
Target
92569006d7dac7c2cebb9f7d5ce3a81505392e1364fb4061d011053a7e1967c3.zip
-
Size
4.3MB
-
Sample
241014-v3q4qa1cpk
-
MD5
7789023999661926c622240c0825982c
-
SHA1
b8491171709afaa5f79bc4bf6f50389012a7aeee
-
SHA256
c1b532a4aa0b92509e257a8a4fb40b02c2f49d5a29dd190ca4ec2b778b97df75
-
SHA512
7a57ee5376e57a7e1de6e56e74683660eb55c97f910619f0b9313bfa315a0806d799a6641fb70afc983f8e0427cd66958a4a46ff78698cbcc1c2ed50e9c20bc1
-
SSDEEP
98304:vdq/so9PVYIX5zpemqAguArtjTiWH4e9vX4mudDqGDBP3thesHlqIe:v4/s2JDGpnrdTiWYEX4TduGDBPe
Static task
static1
Behavioral task
behavioral1
Sample
92569006d7dac7c2cebb9f7d5ce3a81505392e1364fb4061d011053a7e1967c3.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
92569006d7dac7c2cebb9f7d5ce3a81505392e1364fb4061d011053a7e1967c3.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
92569006d7dac7c2cebb9f7d5ce3a81505392e1364fb4061d011053a7e1967c3
-
Size
7.9MB
-
MD5
ec978ef8018157e2d02538ce72df2028
-
SHA1
303f59e8250840f95ea0ac0fad825bb12b0648a9
-
SHA256
92569006d7dac7c2cebb9f7d5ce3a81505392e1364fb4061d011053a7e1967c3
-
SHA512
be1ef6d188cec13333c28e563589c87f231bbe4f3357ddf230177441628f8996075b0c8de46db10b9804680513c3c6af20f42fc3ddbb9aabf8522117a54f9f1d
-
SSDEEP
98304:RWzCG+71mj7ARs8R86qbiYmSgU+Tg1tYN/4WfoI55iSRG17VKekxpW4:aCPkj7ARn8JiYgUv1G/4U5rcUD7
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4