General
-
Target
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203
-
Size
7.9MB
-
Sample
241021-3vls2atemd
-
MD5
51f9f4196f87f456a7e246fb9659a486
-
SHA1
721090ca68835f3957552fe4e41335cdf046a74c
-
SHA256
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203
-
SHA512
7934b833adad63329bb3a258553ad1e09baa17f3312a1d9e5905b7c3ab1a5616249d5b88b6dd6bef9a68c65b07dc6daad5cce874d94c1b2f3b10089e4180d00f
-
SSDEEP
98304:Ed2/CHRshfrc3XKVKEW5iSRGax8Czeu6F8HSKXnEWIgnGMiS4rKtGag8dZC:Ew/QRYfw3XKUXrd8keunHXxXnnIKtzK
Static task
static1
Behavioral task
behavioral1
Sample
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203.apk
Resource
android-x64-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203
-
Size
7.9MB
-
MD5
51f9f4196f87f456a7e246fb9659a486
-
SHA1
721090ca68835f3957552fe4e41335cdf046a74c
-
SHA256
0338989191ce53a1a4adf3d4dd5471e470a299f6e8a30b1aa1858e1bc1b5f203
-
SHA512
7934b833adad63329bb3a258553ad1e09baa17f3312a1d9e5905b7c3ab1a5616249d5b88b6dd6bef9a68c65b07dc6daad5cce874d94c1b2f3b10089e4180d00f
-
SSDEEP
98304:Ed2/CHRshfrc3XKVKEW5iSRGax8Czeu6F8HSKXnEWIgnGMiS4rKtGag8dZC:Ew/QRYfw3XKUXrd8keunHXxXnnIKtzK
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3