General
-
Target
f163cdc85d8637d5d66cafd550670523ae79999fcda03fb45cfb357a1eae1d01
-
Size
9.2MB
-
Sample
241127-3bg1qsvpat
-
MD5
857f10858b18d1b7570d319c51fb4a2c
-
SHA1
85e026819a801631047ba623619f839d42b168a6
-
SHA256
f163cdc85d8637d5d66cafd550670523ae79999fcda03fb45cfb357a1eae1d01
-
SHA512
f84206d13ed29e356e3cb4d6a403474ece9f888a8843ad09a36f3b906f67a52c5442ee1ece55a6eed3c9f0cae6a9380508856ec379c1e6f8297dbdad3d6f4617
-
SSDEEP
196608:01tI4GciB6eVRMriO15415t0BY1roED9cX286g/6odenKia1o94Wc:01tI4TAZVRt15t0BY1rXDfg/6FxDZc
Static task
static1
Behavioral task
behavioral1
Sample
f163cdc85d8637d5d66cafd550670523ae79999fcda03fb45cfb357a1eae1d01.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f163cdc85d8637d5d66cafd550670523ae79999fcda03fb45cfb357a1eae1d01.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f163cdc85d8637d5d66cafd550670523ae79999fcda03fb45cfb357a1eae1d01.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
https://156350786312d7feba2b1c9b7577097b.com
Targets
-
-
Target
f163cdc85d8637d5d66cafd550670523ae79999fcda03fb45cfb357a1eae1d01
-
Size
9.2MB
-
MD5
857f10858b18d1b7570d319c51fb4a2c
-
SHA1
85e026819a801631047ba623619f839d42b168a6
-
SHA256
f163cdc85d8637d5d66cafd550670523ae79999fcda03fb45cfb357a1eae1d01
-
SHA512
f84206d13ed29e356e3cb4d6a403474ece9f888a8843ad09a36f3b906f67a52c5442ee1ece55a6eed3c9f0cae6a9380508856ec379c1e6f8297dbdad3d6f4617
-
SSDEEP
196608:01tI4GciB6eVRMriO15415t0BY1roED9cX286g/6odenKia1o94Wc:01tI4TAZVRt15t0BY1rXDfg/6FxDZc
Score10/10-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload
-
Tanglebot family
-
-
-
Target
base.apk
-
Size
8.4MB
-
MD5
70ab871f494c38544e6a4de2baec9bf1
-
SHA1
87066ef241f959d67656cb982d8d72cf5b4a410a
-
SHA256
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f
-
SHA512
3b336bfa34276e281e07240daff65fcdfe3d71b8af1fc7dd39b653d190bbea17c55fd339c496a51d71e8b1b99cb6b5121e13c972e1256b03217f1163a460e906
-
SSDEEP
98304:1NFi4t5tVKW05iSRGA1SFVkhe+4j76G+lru2/2pC0s4rgI6NRs40bTO:17Xt5tUXraFiUpj71+zHlNR1Ii
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4