General
-
Target
40884aa4539a1d5fcddaf62c0a4eabae6be148dc0d20885719ca46a11db1352d
-
Size
4.8MB
-
Sample
241103-zgc27atfqh
-
MD5
ee67e71551bae9518f458fe399186590
-
SHA1
a3c6d09525a3fe7a66e87926cc8f84d818d2bfac
-
SHA256
40884aa4539a1d5fcddaf62c0a4eabae6be148dc0d20885719ca46a11db1352d
-
SHA512
59bffbf9f04138943160b4d05d0f0b142b9cc80056ee0dc88e82ca84aeb6dc0ad85d204c7fc8ef321f27e92c09731bfcdd1479fc373c4d8205b2e006f9e9e97b
-
SSDEEP
49152:vRsEX+wypKBF3Xdl45iS7xrGhGkHTC7jVKScL49owAn7+o3PpFcRVSf:vRsmyp8F3Xw5iSRG6HVKe6n7+6R2RVSf
Static task
static1
Behavioral task
behavioral1
Sample
40884aa4539a1d5fcddaf62c0a4eabae6be148dc0d20885719ca46a11db1352d.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
40884aa4539a1d5fcddaf62c0a4eabae6be148dc0d20885719ca46a11db1352d
-
Size
4.8MB
-
MD5
ee67e71551bae9518f458fe399186590
-
SHA1
a3c6d09525a3fe7a66e87926cc8f84d818d2bfac
-
SHA256
40884aa4539a1d5fcddaf62c0a4eabae6be148dc0d20885719ca46a11db1352d
-
SHA512
59bffbf9f04138943160b4d05d0f0b142b9cc80056ee0dc88e82ca84aeb6dc0ad85d204c7fc8ef321f27e92c09731bfcdd1479fc373c4d8205b2e006f9e9e97b
-
SSDEEP
49152:vRsEX+wypKBF3Xdl45iS7xrGhGkHTC7jVKScL49owAn7+o3PpFcRVSf:vRsmyp8F3Xw5iSRG6HVKe6n7+6R2RVSf
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4