General
-
Target
3f99aad460f24330fce28b40f83d9065c0af0b5e30a30064ff0f1e187f08b978
-
Size
9.3MB
-
Sample
241111-ln5twsxgme
-
MD5
9f49d1e7f508f0b8eb1c47680712369a
-
SHA1
d694730eb99272c3bac8e5e7671d96d41d32dc5b
-
SHA256
3f99aad460f24330fce28b40f83d9065c0af0b5e30a30064ff0f1e187f08b978
-
SHA512
5cc2e868f5757d1dde47f2647238a10b70dfafa1d9e8483a4a7f34733deaf3c3487b031a885fb8947364d48afef40df023580845c561b385063c2f79ec703199
-
SSDEEP
98304:SHmdGqwxVKf7v+3Xy5iSRGH+lpkRRsOjIqZKeIKKaL2bO3uRbTMD4pf57n:zGvUzm3XyrmRrINRbTMD4l57n
Static task
static1
Behavioral task
behavioral1
Sample
3f99aad460f24330fce28b40f83d9065c0af0b5e30a30064ff0f1e187f08b978.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
3f99aad460f24330fce28b40f83d9065c0af0b5e30a30064ff0f1e187f08b978
-
Size
9.3MB
-
MD5
9f49d1e7f508f0b8eb1c47680712369a
-
SHA1
d694730eb99272c3bac8e5e7671d96d41d32dc5b
-
SHA256
3f99aad460f24330fce28b40f83d9065c0af0b5e30a30064ff0f1e187f08b978
-
SHA512
5cc2e868f5757d1dde47f2647238a10b70dfafa1d9e8483a4a7f34733deaf3c3487b031a885fb8947364d48afef40df023580845c561b385063c2f79ec703199
-
SSDEEP
98304:SHmdGqwxVKf7v+3Xy5iSRGH+lpkRRsOjIqZKeIKKaL2bO3uRbTMD4pf57n:zGvUzm3XyrmRrINRbTMD4l57n
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3