General
-
Target
aeb6e4805515dd992a8d70bdee180a2ce5e4516b0927c8bce2592cae0e42b7c2
-
Size
9.8MB
-
Sample
241201-11gedsyqdk
-
MD5
1484df717869ce10eeaf4ad1d6c3dcfe
-
SHA1
9611c6defcc0e301aa7ce26cc7e7785e4964fc25
-
SHA256
aeb6e4805515dd992a8d70bdee180a2ce5e4516b0927c8bce2592cae0e42b7c2
-
SHA512
098ae1a718826533d3b2ac9d57edb1555aeeb7a112608d943fd58bc658446128641d9a1306b20dcea92a569ad9205d2e23f26046cd83cdbb2ae9f6029894eef3
-
SSDEEP
196608:mUUj7/ReeGqyEFVtaX0MN7IdYPe4j7h0brwUU:m/pYPQrw1
Static task
static1
Behavioral task
behavioral1
Sample
aeb6e4805515dd992a8d70bdee180a2ce5e4516b0927c8bce2592cae0e42b7c2.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
octo
Targets
-
-
Target
aeb6e4805515dd992a8d70bdee180a2ce5e4516b0927c8bce2592cae0e42b7c2
-
Size
9.8MB
-
MD5
1484df717869ce10eeaf4ad1d6c3dcfe
-
SHA1
9611c6defcc0e301aa7ce26cc7e7785e4964fc25
-
SHA256
aeb6e4805515dd992a8d70bdee180a2ce5e4516b0927c8bce2592cae0e42b7c2
-
SHA512
098ae1a718826533d3b2ac9d57edb1555aeeb7a112608d943fd58bc658446128641d9a1306b20dcea92a569ad9205d2e23f26046cd83cdbb2ae9f6029894eef3
-
SSDEEP
196608:mUUj7/ReeGqyEFVtaX0MN7IdYPe4j7h0brwUU:m/pYPQrw1
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3