General
-
Target
0b3cd8d23ca38dba9fdee297be9186a36b8f19224b22c577e2d0edcae25bb37a
-
Size
7.3MB
-
Sample
241021-z7skkazanl
-
MD5
c8d0643af82131b011ae92b5632b134e
-
SHA1
1f584874bc031dc6cfd05ceef02162cc1a79add3
-
SHA256
0b3cd8d23ca38dba9fdee297be9186a36b8f19224b22c577e2d0edcae25bb37a
-
SHA512
3568b8e693095143da0de37149ac83eb27dc082331ea7c5ac67ed6f2d44d9da98ad436bbd8234fe63cb6a244866cb463b41f640d801d23157ef4efbcf4952c16
-
SSDEEP
196608:mqxULREXv3Xfr8oZlYeOSA9DS6gQC/gsLigt:Jxtr8o3YepzP/gsWa
Static task
static1
Behavioral task
behavioral1
Sample
0b3cd8d23ca38dba9fdee297be9186a36b8f19224b22c577e2d0edcae25bb37a.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
0b3cd8d23ca38dba9fdee297be9186a36b8f19224b22c577e2d0edcae25bb37a
-
Size
7.3MB
-
MD5
c8d0643af82131b011ae92b5632b134e
-
SHA1
1f584874bc031dc6cfd05ceef02162cc1a79add3
-
SHA256
0b3cd8d23ca38dba9fdee297be9186a36b8f19224b22c577e2d0edcae25bb37a
-
SHA512
3568b8e693095143da0de37149ac83eb27dc082331ea7c5ac67ed6f2d44d9da98ad436bbd8234fe63cb6a244866cb463b41f640d801d23157ef4efbcf4952c16
-
SSDEEP
196608:mqxULREXv3Xfr8oZlYeOSA9DS6gQC/gsLigt:Jxtr8o3YepzP/gsWa
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4