General
-
Target
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f
-
Size
8.4MB
-
Sample
241127-3cprza1mhq
-
MD5
70ab871f494c38544e6a4de2baec9bf1
-
SHA1
87066ef241f959d67656cb982d8d72cf5b4a410a
-
SHA256
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f
-
SHA512
3b336bfa34276e281e07240daff65fcdfe3d71b8af1fc7dd39b653d190bbea17c55fd339c496a51d71e8b1b99cb6b5121e13c972e1256b03217f1163a460e906
-
SSDEEP
98304:1NFi4t5tVKW05iSRGA1SFVkhe+4j76G+lru2/2pC0s4rgI6NRs40bTO:17Xt5tUXraFiUpj71+zHlNR1Ii
Static task
static1
Behavioral task
behavioral1
Sample
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
octo
https://156350786312d7feba2b1c9b7577097b.com
Targets
-
-
Target
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f
-
Size
8.4MB
-
MD5
70ab871f494c38544e6a4de2baec9bf1
-
SHA1
87066ef241f959d67656cb982d8d72cf5b4a410a
-
SHA256
c7678bdc1ca3e4c42c4d7809312b46eaf8735f183dd18a1c5451dd0ffbdf0c1f
-
SHA512
3b336bfa34276e281e07240daff65fcdfe3d71b8af1fc7dd39b653d190bbea17c55fd339c496a51d71e8b1b99cb6b5121e13c972e1256b03217f1163a460e906
-
SSDEEP
98304:1NFi4t5tVKW05iSRGA1SFVkhe+4j76G+lru2/2pC0s4rgI6NRs40bTO:17Xt5tUXraFiUpj71+zHlNR1Ii
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4