General
-
Target
3a78c03342da8226dbda1a372402a83fcbc350426b14e4ecd4ff69149b14c595
-
Size
9.4MB
-
Sample
241201-1kd94axraj
-
MD5
0f0b187f5fcdfc74ecea183b306db7e5
-
SHA1
96de75bfb888dac59e35f2949f40dec3f7d860c7
-
SHA256
3a78c03342da8226dbda1a372402a83fcbc350426b14e4ecd4ff69149b14c595
-
SHA512
68112e38b0d9adfc7e807e2714d45b5f7b2b69b5e09d429e8c04edd04a96dfe28388f3212dcf0746fdf936b31081a9610ebe4033d25a039957d349137cbb249a
-
SSDEEP
196608:E1AVKU5GcOMQ4B2Yb9AzpSreL5jir3brH8YIl4eaY3XMxhCGUHNa:EBU5UMD25VLRirHLIl4MLg
Static task
static1
Behavioral task
behavioral1
Sample
3a78c03342da8226dbda1a372402a83fcbc350426b14e4ecd4ff69149b14c595.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
base.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
3a78c03342da8226dbda1a372402a83fcbc350426b14e4ecd4ff69149b14c595
-
Size
9.4MB
-
MD5
0f0b187f5fcdfc74ecea183b306db7e5
-
SHA1
96de75bfb888dac59e35f2949f40dec3f7d860c7
-
SHA256
3a78c03342da8226dbda1a372402a83fcbc350426b14e4ecd4ff69149b14c595
-
SHA512
68112e38b0d9adfc7e807e2714d45b5f7b2b69b5e09d429e8c04edd04a96dfe28388f3212dcf0746fdf936b31081a9610ebe4033d25a039957d349137cbb249a
-
SSDEEP
196608:E1AVKU5GcOMQ4B2Yb9AzpSreL5jir3brH8YIl4eaY3XMxhCGUHNa:EBU5UMD25VLRirHLIl4MLg
Score10/10-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload
-
Tanglebot family
-
-
-
Target
base.apk
-
Size
7.8MB
-
MD5
5d831c0e36819ddef6b5b65b9eb55bb5
-
SHA1
dec7cb50027a807bb39d582024625d1ae072c3ea
-
SHA256
d31a5392b34e71357268732875e3a6a3634a3f455042d0471164056cddea69cd
-
SHA512
a90d6d3fdc03e81b3a08cd2e8b1eaa8d0c03e37a5767d05310311833d68bc8bc51191edc11112353c8561a94570d82ac9c22322a124b3f4fdb50c135a86d8f91
-
SSDEEP
98304:6IKgO34lO/rCLHdxRfKXcgklipbTj7UVKo75iSRGYgGiBIYIkRs+w:/O3tr6xRfKXGlipPj7UUurjeIhkRjw
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4