General
-
Target
a38001f2d8f3c817f3579e676dd57dd0826bc7e07ab9c64fe279918da9a49374
-
Size
7.6MB
-
Sample
241017-gzygqswajc
-
MD5
b8411f981726df894bd3be20fc905be3
-
SHA1
91a1455e833505c864c7911524a2d92bb66f6de8
-
SHA256
a38001f2d8f3c817f3579e676dd57dd0826bc7e07ab9c64fe279918da9a49374
-
SHA512
4006968afe1de57608235e18d2373f19374b9c2270f9d440d3f4607bdd19ce12215afd9e513d6128ff694fa9c991d3b94f7ca184f17b429bf0bee61f2120780d
-
SSDEEP
98304:MElSb73N1O86wj7KRstD399zlZVKLnc/9/5iSRG0gVpsk:MBRNj7KRm99zXUrwxrW9
Static task
static1
Behavioral task
behavioral1
Sample
a38001f2d8f3c817f3579e676dd57dd0826bc7e07ab9c64fe279918da9a49374.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a38001f2d8f3c817f3579e676dd57dd0826bc7e07ab9c64fe279918da9a49374.apk
Resource
android-x64-20240624-en
Malware Config
Extracted
octo
https://3eaeecee59236992bdd208952b783e39.au
https://9439fba008d7b8de8f77b13f0b55792b.uk
https://649561c1c64a0163240fe3b4aa9e84df.net
https://2a10fb95e85de2ec8940ffcde6d625ed.in
https://8f3935d7f12f86703cfe6634f42995ff.ua
https://0fda2d426ed8312561b8a9885a89f9e0.de
https://3c5ed2332f91eb9c1471f4b15b9affd9.ca
https://30dbb12403845fe70854f073b49ea567.us
https://29b9cd62c2d3a637943ea235409895c3.org
https://8fd9bd7ff33c890cbce381116049071e.info
https://b2823414ceb39e6c24579bbba518d081.ir
Targets
-
-
Target
a38001f2d8f3c817f3579e676dd57dd0826bc7e07ab9c64fe279918da9a49374
-
Size
7.6MB
-
MD5
b8411f981726df894bd3be20fc905be3
-
SHA1
91a1455e833505c864c7911524a2d92bb66f6de8
-
SHA256
a38001f2d8f3c817f3579e676dd57dd0826bc7e07ab9c64fe279918da9a49374
-
SHA512
4006968afe1de57608235e18d2373f19374b9c2270f9d440d3f4607bdd19ce12215afd9e513d6128ff694fa9c991d3b94f7ca184f17b429bf0bee61f2120780d
-
SSDEEP
98304:MElSb73N1O86wj7KRstD399zlZVKLnc/9/5iSRG0gVpsk:MBRNj7KRm99zXUrwxrW9
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4