General
-
Target
07db2dec96359de45a4d1ac1790d02595f17de0888d269bafab4fbce3baf59cc
-
Size
4.8MB
-
Sample
241125-pl8dsasqfm
-
MD5
b72a2b0f5cfdfb9f840030f8003d0857
-
SHA1
3d0428516f456fe55640ec688bd3a2f417295350
-
SHA256
07db2dec96359de45a4d1ac1790d02595f17de0888d269bafab4fbce3baf59cc
-
SHA512
c016546828652e19aaa978383ba21bb1cef2c225db218eb95b0176815dc0069b64f1f952bb275521d076a5950c5c6f79876ffed23f2f7dcb843e74ec39387f1d
-
SSDEEP
49152:TRsEXm3aQKgmj7gL45iS7xrGH/hAK64jVKScnTM+o3vybl6dZjIixKrf:TRshfxmj7gc5iSRGemVK5TJ6ZUtT
Static task
static1
Behavioral task
behavioral1
Sample
07db2dec96359de45a4d1ac1790d02595f17de0888d269bafab4fbce3baf59cc.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
07db2dec96359de45a4d1ac1790d02595f17de0888d269bafab4fbce3baf59cc
-
Size
4.8MB
-
MD5
b72a2b0f5cfdfb9f840030f8003d0857
-
SHA1
3d0428516f456fe55640ec688bd3a2f417295350
-
SHA256
07db2dec96359de45a4d1ac1790d02595f17de0888d269bafab4fbce3baf59cc
-
SHA512
c016546828652e19aaa978383ba21bb1cef2c225db218eb95b0176815dc0069b64f1f952bb275521d076a5950c5c6f79876ffed23f2f7dcb843e74ec39387f1d
-
SSDEEP
49152:TRsEXm3aQKgmj7gL45iS7xrGH/hAK64jVKScnTM+o3vybl6dZjIixKrf:TRshfxmj7gc5iSRGemVK5TJ6ZUtT
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4