General
-
Target
3a61853e2de7bf657cbd080b4a83e1e0e7c77f02c5a7a4762fe96510592e69de
-
Size
9.9MB
-
Sample
241111-lspcpsxell
-
MD5
5506094b6d46b5779dc9a2b4524550ad
-
SHA1
829bde64905b0048e715b2a65248930aee15cf01
-
SHA256
3a61853e2de7bf657cbd080b4a83e1e0e7c77f02c5a7a4762fe96510592e69de
-
SHA512
e9a9c309b04a883b43767c97a048e91a03ad9c7ff6a360efba52ee3406dd1e5023dfb993a5af2b950636d477559b9113abdcf345159e6b57957ce6fe3c8bccaa
-
SSDEEP
98304:YBqqKyqDIkp9BRhM3XFRs1d5iSRGAIVKF70cgSoAqNTAJTsj+dXpKodYcUZ3RQRA:YkJlm3XFR8rSUCMqNkVrRu3R
Static task
static1
Behavioral task
behavioral1
Sample
3a61853e2de7bf657cbd080b4a83e1e0e7c77f02c5a7a4762fe96510592e69de.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
octo
Targets
-
-
Target
3a61853e2de7bf657cbd080b4a83e1e0e7c77f02c5a7a4762fe96510592e69de
-
Size
9.9MB
-
MD5
5506094b6d46b5779dc9a2b4524550ad
-
SHA1
829bde64905b0048e715b2a65248930aee15cf01
-
SHA256
3a61853e2de7bf657cbd080b4a83e1e0e7c77f02c5a7a4762fe96510592e69de
-
SHA512
e9a9c309b04a883b43767c97a048e91a03ad9c7ff6a360efba52ee3406dd1e5023dfb993a5af2b950636d477559b9113abdcf345159e6b57957ce6fe3c8bccaa
-
SSDEEP
98304:YBqqKyqDIkp9BRhM3XFRs1d5iSRGAIVKF70cgSoAqNTAJTsj+dXpKodYcUZ3RQRA:YkJlm3XFR8rSUCMqNkVrRu3R
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3