General
-
Target
d0bfe2fcd0f6feeef488085964c91a6613535f40428b09c74d46c2e5f5621fd7
-
Size
4.8MB
-
Sample
241108-pz4mra1raw
-
MD5
1da916f1ef0114e75d5594267e4a5b1e
-
SHA1
bda3b2e6d92fc1f4a529cdd1ea27088d7322a49c
-
SHA256
d0bfe2fcd0f6feeef488085964c91a6613535f40428b09c74d46c2e5f5621fd7
-
SHA512
7f39854c1649a482b6f916d9f4338b966cfc8307281389ef662835ceb26182ce015fe376eae485c48ed148cbf731200287426fa5661663cd2d651ddf1c811aeb
-
SSDEEP
49152:9RsEXuIFKYQ3XVZ45iS7xrG4/Fg2qHjVKSctgPt43wA5XKkmAU4OAmI:9RsSFJQ3XE5iSRGfDVKWPABo34MI
Static task
static1
Behavioral task
behavioral1
Sample
d0bfe2fcd0f6feeef488085964c91a6613535f40428b09c74d46c2e5f5621fd7.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
d0bfe2fcd0f6feeef488085964c91a6613535f40428b09c74d46c2e5f5621fd7
-
Size
4.8MB
-
MD5
1da916f1ef0114e75d5594267e4a5b1e
-
SHA1
bda3b2e6d92fc1f4a529cdd1ea27088d7322a49c
-
SHA256
d0bfe2fcd0f6feeef488085964c91a6613535f40428b09c74d46c2e5f5621fd7
-
SHA512
7f39854c1649a482b6f916d9f4338b966cfc8307281389ef662835ceb26182ce015fe376eae485c48ed148cbf731200287426fa5661663cd2d651ddf1c811aeb
-
SSDEEP
49152:9RsEXuIFKYQ3XVZ45iS7xrG4/Fg2qHjVKSctgPt43wA5XKkmAU4OAmI:9RsSFJQ3XE5iSRGfDVKWPABo34MI
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4