General
-
Target
a7366698a18db482a14e79a70e5be9ac7416ccf0a1628bc1ec94f0a91ee9af8f.bin
-
Size
4.8MB
-
Sample
241108-11b5ns1cmp
-
MD5
65faca73a34e9401c01e5bebcadbf741
-
SHA1
3612e2840679871f404834b5b5287dcad170c870
-
SHA256
a7366698a18db482a14e79a70e5be9ac7416ccf0a1628bc1ec94f0a91ee9af8f
-
SHA512
5ace55312b1989db317ee27f866fe08b51497b534c501e020c0659028c4ff723ad8338e320861773d7c18b2ba1ec2d0403e08f034e33acc30b7570e4fa00bbfa
-
SSDEEP
49152:JmRsEXngvbK7h3XpD45iS7xrGdrl6G1RAjVKSc4tEHXqG9TlNJ7HUSKX:cRsDD2h3Xq5iSRGJcVKnNDgSKX
Static task
static1
Behavioral task
behavioral1
Sample
a7366698a18db482a14e79a70e5be9ac7416ccf0a1628bc1ec94f0a91ee9af8f.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a7366698a18db482a14e79a70e5be9ac7416ccf0a1628bc1ec94f0a91ee9af8f.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
octo
https://0ba34225aa78d735a7976d154677b70e.au
https://d3c871c600ea72d49f3b240bf669e5b2.us
https://ae7d7a32f3872ac8535e0c14291e30bf.in
https://c9e49415bb52b3e0db9fc320b95e63aa.ir
https://8e91f3acdf94168af13e3ba8808273b6.uk
https://62b07532ca4b58f66a942e1d2fccf28b.info
Targets
-
-
Target
a7366698a18db482a14e79a70e5be9ac7416ccf0a1628bc1ec94f0a91ee9af8f.bin
-
Size
4.8MB
-
MD5
65faca73a34e9401c01e5bebcadbf741
-
SHA1
3612e2840679871f404834b5b5287dcad170c870
-
SHA256
a7366698a18db482a14e79a70e5be9ac7416ccf0a1628bc1ec94f0a91ee9af8f
-
SHA512
5ace55312b1989db317ee27f866fe08b51497b534c501e020c0659028c4ff723ad8338e320861773d7c18b2ba1ec2d0403e08f034e33acc30b7570e4fa00bbfa
-
SSDEEP
49152:JmRsEXngvbK7h3XpD45iS7xrGdrl6G1RAjVKSc4tEHXqG9TlNJ7HUSKX:cRsDD2h3Xq5iSRGJcVKnNDgSKX
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4